








| D Value vs Policy Name | ||
| D = 10 | D = 8 | D = 6 | D = 4 | D = 3 | D = 1 | |||
| Global | Protection | Tracking | Silent | Local | D = 2 | Write | ||
| Approval | Disabled | Only | Alarm | Approval | Lockdown | Protect | ||
| New/Pending | Auto | Permit | Permit | Permit | Auto | Block | Block | 
| Executables | Global | execution, | Local | Execution, | Write/Exec, | ||
| *.exe, *.sys, . . . | Approve | Report | Approve | Notify, | Notify, | ||
| New, | New, | Report | Report | ||||
| Report | Report | ||||||
| New/Pending | Auto | Permit | Permit | Permit | Auto | Block | Block | 
| Standalone Scripts | Global | execution, | Local | Execution, | Write/Exec, | ||
| *.vbs, *.bat, . . . | Approve | Report | Approve | Notify, | Notify, | ||
| New, | New, | Report | Report | ||||
| Report | Report | ||||||
| New/Pending | Auto | Permit | Permit | Permit | Auto | Block | Block | 
| Embedded Scripts | Global | execution, | Local | Execution, | Write/Exec, | ||
| In *.doc, *.xls, . . . | Approve | Report | Approve | Notify, | Notify, | ||
| New, | New, | Report | Report | ||||
| Report | Report | ||||||
| New Web Content | Auto | Permit | Permit | Permit | Permit | Write | Write | 
| *.html, *.asp, . . . | Global | Writes, | Writes, | Protect, | Protect, | ||
| Approve | Report | Report | Report | Report | |||
| New, | |||||||
| Report | |||||||
| Approved | Permit | Permit | Permit | Permit | Permit | Permit | Permit | 
| (hash and/or name) | |||||||
| Exes/Scripts/Embed | |||||||
| Banned/Unapproved | Permit | Permit | Block | Block | Block | Block | Block | 
| (by hash) | Execution, | Execution, | Execution, | Execution, | Execution, | ||
| Exes/Scripts/Embed | Notify, | Notify, | Notify, | Notify, | Notify, | ||
| Report | Report | Report | Report | Report | |||
| Banned/Unapproved | Permit | Permit | Block | Block | Block | Block | Block | 
| (by name) | Execution, | Execution, | Execution, | Execution, | Execution, | ||
| Exes/Scripts/Embed | Notify, | Notify, | Notify, | Notify, | Notify, | ||
| Report | Report | Report | Report | Report | |||
| Content change and | Track, | Permit | Track, | Track, | Track, | Track, | Track, | 
| Content creation | Report | Report | Report | Report | Report | Report | |
| tracking | |||||||
| Application Number | Priority Date | Filing Date | Title | 
|---|---|---|---|
| US11/194,078US8984636B2 (en) | 2005-07-29 | 2005-07-29 | Content extractor and analysis system | 
| CN200680034493.4ACN101569129B (en) | 2005-07-29 | 2006-07-27 | Network security system and method | 
| EP06788969.1AEP1920338B1 (en) | 2005-07-29 | 2006-07-27 | Network security systems and methods | 
| CA2617204ACA2617204C (en) | 2005-07-29 | 2006-07-27 | Network security systems and methods | 
| CN201410112822.9ACN103984891A (en) | 2005-07-29 | 2006-07-27 | Network security systems and methods | 
| JP2008524253AJP2009507271A (en) | 2005-07-29 | 2006-07-27 | Network security system and method | 
| PCT/US2006/029714WO2007016478A2 (en) | 2005-07-29 | 2006-07-27 | Network security systems and methods | 
| BRPI0616018-2ABRPI0616018A2 (en) | 2005-07-29 | 2006-07-27 | security systems and methods for computer networks | 
| JP2012046805AJP5809084B2 (en) | 2005-07-29 | 2012-03-02 | Network security system and method | 
| Application Number | Priority Date | Filing Date | Title | 
|---|---|---|---|
| US11/194,078US8984636B2 (en) | 2005-07-29 | 2005-07-29 | Content extractor and analysis system | 
| Publication Number | Publication Date | 
|---|---|
| US20070028110A1true US20070028110A1 (en) | 2007-02-01 | 
| US8984636B2 US8984636B2 (en) | 2015-03-17 | 
| Application Number | Title | Priority Date | Filing Date | 
|---|---|---|---|
| US11/194,078Active2029-04-03US8984636B2 (en) | 2005-07-29 | 2005-07-29 | Content extractor and analysis system | 
| Country | Link | 
|---|---|
| US (1) | US8984636B2 (en) | 
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| US20070112814A1 (en)* | 2005-11-12 | 2007-05-17 | Cheshire Stuart D | Methods and systems for providing improved security when using a uniform resource locator (URL) or other address or identifier | 
| US20080034434A1 (en)* | 2006-08-03 | 2008-02-07 | Rolf Repasi | Obtaining network origins of potential software threats | 
| US20080250100A1 (en)* | 2007-04-03 | 2008-10-09 | Sony Corporation | Information processing apparatus, information processing method and computer program | 
| US20080271147A1 (en)* | 2007-04-30 | 2008-10-30 | Microsoft Corporation | Pattern matching for spyware detection | 
| US20090012813A1 (en)* | 2007-07-06 | 2009-01-08 | Mckesson Financial Holdings Limited | Systems and methods for managing medical information | 
| US20090077428A1 (en)* | 2007-09-14 | 2009-03-19 | Softkvm Llc | Software Method And System For Controlling And Observing Computer Networking Devices | 
| US20090172768A1 (en)* | 2007-12-28 | 2009-07-02 | Huifeng Le | Methods and apparatus for operating embedded information technology applications with a service operating system | 
| CN101539772A (en)* | 2008-01-25 | 2009-09-23 | 洛克威尔自动控制技术股份有限公司 | Product lifecycle management method and apparatus | 
| US20100083380A1 (en)* | 2008-09-29 | 2010-04-01 | Harris Mark D | Network stream scanning facility | 
| US20100161608A1 (en)* | 2008-12-18 | 2010-06-24 | Sumooh Inc. | Methods and apparatus for content-aware data de-duplication | 
| US7840958B1 (en)* | 2006-02-17 | 2010-11-23 | Trend Micro, Inc. | Preventing spyware installation | 
| CN101286986B (en)* | 2008-05-15 | 2011-09-14 | 成都市华为赛门铁克科技有限公司 | Active defense method, device and system | 
| US20110225141A1 (en)* | 2010-03-12 | 2011-09-15 | Copiun, Inc. | Distributed Catalog, Data Store, and Indexing | 
| US20110231374A1 (en)* | 2010-03-16 | 2011-09-22 | Copiun, Inc. | Highly Scalable and Distributed Data De-Duplication | 
| US20120066762A1 (en)* | 2010-09-13 | 2012-03-15 | Rade Todorovic | System and method of whitelisting parent virtual images | 
| US8161548B1 (en) | 2005-08-15 | 2012-04-17 | Trend Micro, Inc. | Malware detection using pattern classification | 
| US20120150897A1 (en)* | 2010-12-08 | 2012-06-14 | International Business Machines Corporation | Calculating State of Cryptographic Objects and Generating Search Filter for Querying Cryptographic Objects | 
| US20120198553A1 (en)* | 2009-09-14 | 2012-08-02 | Junko Suginaka | Secure auditing system and secure auditing method | 
| US20140040403A1 (en)* | 2006-02-09 | 2014-02-06 | John Sargent | System, method and computer program product for gathering information relating to electronic content utilizing a dns server | 
| US8706745B1 (en)* | 2008-05-30 | 2014-04-22 | Symantec Corporation | Systems and methods for determining a file set | 
| US8819655B1 (en)* | 2007-09-17 | 2014-08-26 | Symantec Corporation | Systems and methods for computer program update protection | 
| US9043920B2 (en) | 2012-06-27 | 2015-05-26 | Tenable Network Security, Inc. | System and method for identifying exploitable weak points in a network | 
| US9059956B2 (en) | 2003-01-31 | 2015-06-16 | Good Technology Corporation | Asynchronous real-time retrieval of data | 
| US20150180888A1 (en)* | 2007-06-05 | 2015-06-25 | Harish Balasubramanian | System, Method and Computer Program Product for Making a Scan Decision During Communication of Data Over a Network | 
| US9088606B2 (en) | 2012-07-05 | 2015-07-21 | Tenable Network Security, Inc. | System and method for strategic anti-malware monitoring | 
| US9305159B2 (en) | 2004-12-03 | 2016-04-05 | Fortinet, Inc. | Secure system for allowing the execution of authorized computer program code | 
| US20160119375A1 (en)* | 2013-06-04 | 2016-04-28 | Beijing Qihoo Technology Company Limited | Cloud security-based file processing method and apparatus | 
| US20160226901A1 (en)* | 2015-01-30 | 2016-08-04 | Securonix, Inc. | Anomaly Detection Using Adaptive Behavioral Profiles | 
| US9467464B2 (en) | 2013-03-15 | 2016-10-11 | Tenable Network Security, Inc. | System and method for correlating log data to discover network vulnerabilities and assets | 
| CN106096397A (en)* | 2016-05-26 | 2016-11-09 | 倪茂志 | A kind of prevention method extorting software and system | 
| US9602539B1 (en)* | 2012-09-28 | 2017-03-21 | Palo Alto Networks, Inc. | Externally defined objects in security policy | 
| US9621405B2 (en) | 2010-08-24 | 2017-04-11 | Good Technology Holdings Limited | Constant access gateway and de-duplicated data cache server | 
| US9628513B2 (en) | 2007-04-30 | 2017-04-18 | Mcafee, Inc. | Electronic message manager system, method, and computer program product for scanning an electronic message for unwanted content and associated unwanted sites | 
| US9680848B2 (en)* | 2014-12-03 | 2017-06-13 | Korea Internet & Security Agency | Apparatus, system and method for detecting and preventing malicious scripts using code pattern-based static analysis and API flow-based dynamic analysis | 
| US20170351870A1 (en)* | 2016-06-03 | 2017-12-07 | Honeywell International Inc. | Apparatus and method for device whitelisting and blacklisting to override protections for allowed media at nodes of a protected system | 
| US9846706B1 (en)* | 2012-12-28 | 2017-12-19 | EMC IP Holding Company LLC | Managing mounting of file systems | 
| CN107948123A (en)* | 2016-10-12 | 2018-04-20 | 阿里巴巴集团控股有限公司 | Document transmission method and device | 
| CN108804925A (en)* | 2015-05-27 | 2018-11-13 | 安恒通(北京)科技有限公司 | method and system for detecting malicious code | 
| US10152518B2 (en)* | 2014-10-30 | 2018-12-11 | The Johns Hopkins University | Apparatus and method for efficient identification of code similarity | 
| US10225323B2 (en)* | 2012-09-07 | 2019-03-05 | Oracle International Corporation | System and method for providing java cloud services for use with a cloud computing environment | 
| US20190121959A1 (en)* | 2017-08-01 | 2019-04-25 | PC Pitstop, Inc | System, Method, and Apparatus for Computer Security | 
| US10419504B1 (en)* | 2009-04-10 | 2019-09-17 | Open Invention Network Llc | System and method for streaming application isolation | 
| US10476936B1 (en) | 2018-12-13 | 2019-11-12 | Software Ag | Plugin-based file transfer systems and/or methods | 
| US10496812B2 (en) | 2013-09-06 | 2019-12-03 | Michael Guidry | Systems and methods for security in computer systems | 
| US10592942B1 (en) | 2009-04-10 | 2020-03-17 | Open Invention Network Llc | System and method for usage billing of hosted applications | 
| US10606634B1 (en) | 2009-04-10 | 2020-03-31 | Open Invention Network Llc | System and method for application isolation | 
| US10693917B1 (en) | 2009-04-10 | 2020-06-23 | Open Invention Network Llc | System and method for on-line and off-line streaming application isolation | 
| US10873588B2 (en) | 2017-08-01 | 2020-12-22 | Pc Matic, Inc. | System, method, and apparatus for computer security | 
| US20210026951A1 (en)* | 2017-08-01 | 2021-01-28 | PC Matic, Inc | System, Method, and Apparatus for Computer Security | 
| US20210034767A1 (en)* | 2019-08-01 | 2021-02-04 | Palantir Technologies Inc. | Systems and methods for conducting data extraction using dedicated data extraction devices | 
| US11237802B1 (en) | 2020-07-20 | 2022-02-01 | Bank Of America Corporation | Architecture diagram analysis tool for software development | 
| US11314560B1 (en) | 2009-04-10 | 2022-04-26 | Open Invention Network Llc | System and method for hierarchical interception with isolated environments | 
| US11323482B2 (en)* | 2019-12-31 | 2022-05-03 | Mcafee, Llc | Methods, systems, and media for protecting computer systems from user-created objects | 
| CN114679410A (en)* | 2020-12-24 | 2022-06-28 | 网神信息技术(北京)股份有限公司 | Method, device, electronic device and storage medium for reducing external network resource occupation | 
| US11425170B2 (en) | 2018-10-11 | 2022-08-23 | Honeywell International Inc. | System and method for deploying and configuring cyber-security protection solution using portable storage device | 
| US20220382892A1 (en)* | 2021-05-27 | 2022-12-01 | Microsoft Technology Licensing, Llc | Centralized access control for cloud relational database management system resources | 
| US11538078B1 (en) | 2009-04-10 | 2022-12-27 | International Business Machines Corporation | System and method for usage billing of hosted applications | 
| CN117707608A (en)* | 2024-02-04 | 2024-03-15 | 深圳市分秒网络科技有限公司 | Methods and systems for automating configuration file parameters | 
| US20240241980A1 (en)* | 2021-05-27 | 2024-07-18 | Microsoft Technology Licensing, Llc | Centralized access control for cloud relational database management system resources | 
| US12216785B2 (en)* | 2022-09-21 | 2025-02-04 | Acronis International Gmbh | Systems and methods for generating file systems of data sources incompatible with anti-virus scanners | 
| US12229261B1 (en)* | 2024-05-03 | 2025-02-18 | Halcyon Tech, Inc. | Antiransomware file analysis and scoring | 
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| US10122753B2 (en)* | 2014-04-28 | 2018-11-06 | Sophos Limited | Using reputation to avoid false malware detections | 
| US9917851B2 (en) | 2014-04-28 | 2018-03-13 | Sophos Limited | Intrusion detection using a heartbeat | 
| GB201915196D0 (en) | 2014-12-18 | 2019-12-04 | Sophos Ltd | A method and system for network access control based on traffic monitoring and vulnerability detection using process related information | 
| CN107248951B (en)* | 2017-08-10 | 2018-12-04 | 北京明朝万达科技股份有限公司 | A kind of post-processing system, method and device | 
| CN107743306B (en)* | 2017-11-20 | 2021-08-24 | 上海动联信息技术股份有限公司 | Intelligent POS machine WIFI setting method based on multi-password control and intelligent POS machine | 
| RU2739865C2 (en)* | 2018-12-28 | 2020-12-29 | Акционерное общество "Лаборатория Касперского" | System and method of detecting a malicious file | 
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| US4809160A (en)* | 1985-10-28 | 1989-02-28 | Hewlett-Packard Company | Privilege level checking instruction for implementing a secure hierarchical computer system | 
| US4908861A (en)* | 1987-08-28 | 1990-03-13 | International Business Machines Corporation | Data authentication using modification detection codes based on a public one way encryption function | 
| US5278901A (en)* | 1992-04-30 | 1994-01-11 | International Business Machines Corporation | Pattern-oriented intrusion-detection system and method | 
| US5283830A (en)* | 1991-12-17 | 1994-02-01 | International Computers Limited | Security mechanism for a computer system | 
| US5485575A (en)* | 1994-11-21 | 1996-01-16 | International Business Machines Corporation | Automatic analysis of a computer virus structure and means of attachment to its hosts | 
| US5495533A (en)* | 1994-04-29 | 1996-02-27 | International Business Machines Corporation | Personal key archive | 
| US5495571A (en)* | 1992-09-30 | 1996-02-27 | Microsoft Corporation | Method and system for performing parametric testing of a functional programming interface | 
| US5502815A (en)* | 1992-03-30 | 1996-03-26 | Cozza; Paul D. | Method and apparatus for increasing the speed at which computer viruses are detected | 
| US5613107A (en)* | 1992-12-22 | 1997-03-18 | Bull, S.A. | Method and apparatus for managing file versions in an information processing system based on a predetermined amount of storage media | 
| US5613002A (en)* | 1994-11-21 | 1997-03-18 | International Business Machines Corporation | Generic disinfection of programs infected with a computer virus | 
| US5708709A (en)* | 1995-12-08 | 1998-01-13 | Sun Microsystems, Inc. | System and method for managing try-and-buy usage of application programs | 
| US5708780A (en)* | 1995-06-07 | 1998-01-13 | Open Market, Inc. | Internet server access control and monitoring systems | 
| US5859966A (en)* | 1995-10-10 | 1999-01-12 | Data General Corporation | Security system for computer systems | 
| US6018747A (en)* | 1997-11-26 | 2000-01-25 | International Business Machines Corporation | Method for generating and reconstructing in-place delta files | 
| US6021510A (en)* | 1997-11-24 | 2000-02-01 | Symantec Corporation | Antivirus accelerator | 
| US6021491A (en)* | 1996-11-27 | 2000-02-01 | Sun Microsystems, Inc. | Digital signatures for data streams and data archives | 
| US6023723A (en)* | 1997-12-22 | 2000-02-08 | Accepted Marketing, Inc. | Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms | 
| US6023586A (en)* | 1998-02-10 | 2000-02-08 | Novell, Inc. | Integrity verifying and correcting software | 
| US6026502A (en)* | 1997-01-27 | 2000-02-15 | Wakayama; Hironori | Method and mechanism for preventing from invading of computer virus and/or hacker | 
| US6026402A (en)* | 1998-01-07 | 2000-02-15 | Hewlett-Packard Company | Process restriction within file system hierarchies | 
| US6026205A (en)* | 1997-01-21 | 2000-02-15 | Molecular Optoelectronics Corporation | Compound optical waveguide and filter applications thereof | 
| US6029256A (en)* | 1997-12-31 | 2000-02-22 | Network Associates, Inc. | Method and system for allowing computer programs easy access to features of a virus scanning engine | 
| US6029175A (en)* | 1995-10-26 | 2000-02-22 | Teknowledge Corporation | Automatic retrieval of changed files by a network software agent | 
| US6173284B1 (en)* | 1997-05-20 | 2001-01-09 | University Of Charlotte City Of Charlotte | Systems, methods and computer program products for automatically monitoring police records for a crime profile | 
| US6178508B1 (en)* | 1995-12-28 | 2001-01-23 | International Business Machines Corp. | System for controlling access to encrypted data files by a plurality of users | 
| US6195587B1 (en)* | 1993-10-29 | 2001-02-27 | Sophos Plc | Validity checking | 
| US20020002684A1 (en)* | 1998-05-01 | 2002-01-03 | Barbara L. Fox | Intelligent trust management method and system | 
| US6338149B1 (en)* | 1998-07-31 | 2002-01-08 | Westinghouse Electric Company Llc | Change monitoring system for a computer system | 
| US6338141B1 (en)* | 1998-09-30 | 2002-01-08 | Cybersoft, Inc. | Method and apparatus for computer virus detection, analysis, and removal in real time | 
| US20020004908A1 (en)* | 2000-07-05 | 2002-01-10 | Nicholas Paul Andrew Galea | Electronic mail message anti-virus system and method | 
| US20020004874A1 (en)* | 2000-05-01 | 2002-01-10 | Hideyuki Agata | Apparatus and method for processing information, and program and medium used therefor | 
| US20020004902A1 (en)* | 2000-07-07 | 2002-01-10 | Eng-Whatt Toh | Secure and reliable document delivery | 
| US20020005105A1 (en)* | 2000-05-09 | 2002-01-17 | Mcpherson Mathew | Arrangement of a sound hole and construction of a sound board in an acoustic guitar | 
| US20020005017A1 (en)* | 2000-03-31 | 2002-01-17 | Jsr Corporation | Aqueous dispersion for chemical mechanical polishing | 
| US20020019932A1 (en)* | 1999-06-10 | 2002-02-14 | Eng-Whatt Toh | Cryptographically secure network | 
| US6349311B1 (en)* | 1999-02-01 | 2002-02-19 | Symantec Corporation | Storage of reverse delta updates | 
| US6351776B1 (en)* | 1999-11-04 | 2002-02-26 | Xdrive, Inc. | Shared internet storage resource, user interface system, and method | 
| US20020026576A1 (en)* | 2000-08-18 | 2002-02-28 | Hewlett-Packard Company | Apparatus and method for establishing trust | 
| US20030004922A1 (en)* | 2001-06-27 | 2003-01-02 | Ontrack Data International, Inc. | System and method for data management | 
| US6505237B2 (en)* | 1998-07-24 | 2003-01-07 | Siemens Information & Communication Networks, Inc. | Method and system for management of message attachments | 
| US6505300B2 (en)* | 1998-06-12 | 2003-01-07 | Microsoft Corporation | Method and system for secure running of untrusted content | 
| US20030018903A1 (en)* | 2001-03-19 | 2003-01-23 | Greca Damon G. Della | Method of containing spread of computer viruses | 
| US20030015973A1 (en)* | 2001-07-18 | 2003-01-23 | Kevin Ovens | Solid state traffic light with predictive failure analysis | 
| US6513122B1 (en)* | 2001-06-29 | 2003-01-28 | Networks Associates Technology, Inc. | Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities | 
| US6513111B2 (en)* | 1998-02-09 | 2003-01-28 | Reuters, Ltd | Method of controlling software applications specific to a group of users | 
| US6513039B1 (en)* | 1999-06-24 | 2003-01-28 | International Business Machines Corporation | Profile inferencing through automated access control list analysis heuristics | 
| US20030023866A1 (en)* | 2001-07-26 | 2003-01-30 | Hinchliffe Alex James | Centrally managed malware scanning | 
| US20030023857A1 (en)* | 2001-07-26 | 2003-01-30 | Hinchliffe Alexander James | Malware infection suppression | 
| US20030023560A1 (en)* | 2001-07-27 | 2003-01-30 | Fujitsu Limited | Design asset information search system | 
| US20030023864A1 (en)* | 2001-07-25 | 2003-01-30 | Igor Muttik | On-access malware scanning | 
| US20030023867A1 (en)* | 2001-07-25 | 2003-01-30 | Thibadeau Robert H. | Methods and systems for promoting security in a computer system employing attached storage devices | 
| US6516395B1 (en)* | 1997-11-20 | 2003-02-04 | Advanced Micro Devices, Inc. | System and method for controlling access to a privilege-partitioned address space with a fixed set of attributes | 
| US20030028785A1 (en)* | 2001-08-01 | 2003-02-06 | Pak Michael Chin-Hwan | System and method for executing computer virus definitions containing general purpose programming language extensions | 
| US20030033308A1 (en)* | 2001-08-03 | 2003-02-13 | Patel Sujal M. | System and methods for providing a distributed file system utilizing metadata to track information about data stored throughout the system | 
| US20030033303A1 (en)* | 2001-08-07 | 2003-02-13 | Brian Collins | System and method for restricting access to secured data | 
| US20040003279A1 (en)* | 2002-06-28 | 2004-01-01 | Beilinson Craig Adam | User controls for a computer | 
| US20040003274A1 (en)* | 2002-06-28 | 2004-01-01 | Strom Clifford P. | Protecting content on medium from unfettered distribution | 
| US6675205B2 (en)* | 1999-10-14 | 2004-01-06 | Arcessa, Inc. | Peer-to-peer automated anonymous asynchronous file sharing | 
| US6678741B1 (en)* | 1999-04-09 | 2004-01-13 | Sun Microsystems, Inc. | Method and apparatus for synchronizing firmware | 
| US20040010602A1 (en)* | 2002-07-10 | 2004-01-15 | Van Vleck Paul F. | System and method for managing access to digital content via digital rights policies | 
| US6681227B1 (en)* | 1997-11-19 | 2004-01-20 | Ns Solutions Corporation | Database system and a method of data retrieval from the system | 
| US6681344B1 (en)* | 2000-09-14 | 2004-01-20 | Microsoft Corporation | System and method for automatically diagnosing a computer problem | 
| US6681387B1 (en)* | 1999-12-01 | 2004-01-20 | Board Of Trustees Of The University Of Illinois | Method and apparatus for instruction execution hot spot detection and monitoring in a data processing unit | 
| US6684210B1 (en)* | 1998-04-06 | 2004-01-27 | Matsushita Electric Industrial Co., Ltd. | File managing system, file management apparatus, file management method, and program storage medium | 
| US20040019878A1 (en)* | 2002-07-23 | 2004-01-29 | Sreekrishna Kotnur | Software tool to detect and restore damaged or lost software components | 
| US20040025043A1 (en)* | 2002-05-22 | 2004-02-05 | Microsoft Corporation | System and method for identifying potential security risks in controls | 
| US20040031028A1 (en)* | 2002-08-06 | 2004-02-12 | Aardwork Software Limited | Updating of software | 
| US20040030913A1 (en)* | 2002-08-08 | 2004-02-12 | Trend Micro Incorporated | System and method for computer protection against malicious electronic mails by analyzing, profiling and trapping the same | 
| US6694336B1 (en)* | 2000-01-25 | 2004-02-17 | Fusionone, Inc. | Data transfer and synchronization system | 
| US6694457B2 (en)* | 2001-03-06 | 2004-02-17 | Hewlett-Packard Development Company, L.P. | System and method for monitoring execution of privileged instructions | 
| US6694328B1 (en)* | 2000-01-13 | 2004-02-17 | International Business Machines Corporation | Method for creating queries on version objects | 
| US20040034794A1 (en)* | 2000-05-28 | 2004-02-19 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | 
| US20040034638A1 (en)* | 2002-07-18 | 2004-02-19 | International Business Machines Corporation | Method for analyzing and characterizing the usage pattern of a device | 
| US6697810B2 (en)* | 2001-04-19 | 2004-02-24 | Vigilance, Inc. | Security system for event monitoring, detection and notification system | 
| US6697950B1 (en)* | 1999-12-22 | 2004-02-24 | Networks Associates Technology, Inc. | Method and apparatus for detecting a macro computer virus using static analysis | 
| US20040039921A1 (en)* | 2000-10-17 | 2004-02-26 | Shyne-Song Chuang | Method and system for detecting rogue software | 
| US20040039924A1 (en)* | 2001-04-09 | 2004-02-26 | Baldwin Robert W. | System and method for security of computing devices | 
| US20040039932A1 (en)* | 2002-08-23 | 2004-02-26 | Gidon Elazar | Apparatus, system and method for securing digital documents in a digital appliance | 
| US6839721B2 (en)* | 2001-01-12 | 2005-01-04 | Hewlett-Packard Development Company, L.P. | Integration of a database into file management software for protecting, tracking, and retrieving data | 
| US20050005161A1 (en)* | 2003-07-04 | 2005-01-06 | Adrian Baldwin | Services and secure processing environments | 
| US20050004873A1 (en)* | 2003-02-03 | 2005-01-06 | Robin Pou | Distribution and rights management of digital content | 
| US20050004954A1 (en)* | 2003-07-01 | 2005-01-06 | Hand Held Products, Inc. | Systems and methods for expedited data transfer in a communication system using hash segmentation | 
| US20050005168A1 (en)* | 2003-03-11 | 2005-01-06 | Richard Dick | Verified personal information database | 
| US20050010806A1 (en)* | 2003-04-18 | 2005-01-13 | Ounce Labs, Inc. | Method and system for detecting privilege escalation vulnerabilities in source code | 
| US20050010804A1 (en)* | 2002-12-19 | 2005-01-13 | Bruening Derek L. | Secure execution of a computer program using a code cache | 
| US20050015592A1 (en)* | 2003-07-15 | 2005-01-20 | Jeou-Kai Lin | System and method for application and user-based class of security | 
| US20050015675A1 (en)* | 2003-07-03 | 2005-01-20 | Kolawa Adam K. | Method and system for automatic error prevention for computer software | 
| US20050015591A1 (en)* | 2003-06-12 | 2005-01-20 | International Business Machines Corporation | Multi-level multi-user web services security system and method | 
| US20050015760A1 (en)* | 2003-07-16 | 2005-01-20 | Oleg Ivanov | Automatic detection and patching of vulnerable files | 
| US20050022018A1 (en)* | 2003-06-30 | 2005-01-27 | Symantec Corporation | Signature extraction system and method | 
| US20050022016A1 (en)* | 2002-12-12 | 2005-01-27 | Alexander Shipp | Method of and system for heuristically detecting viruses in executable code | 
| US20050022004A1 (en)* | 2001-04-24 | 2005-01-27 | Microsoft Corporation | Robust recognizer of perceptually similar content | 
| US20050021994A1 (en)* | 2003-07-21 | 2005-01-27 | Barton Christopher Andrew | Pre-approval of computer files during a malware detection | 
| US20050028002A1 (en)* | 2003-07-29 | 2005-02-03 | Mihai Christodorescu | Method and apparatus to detect malicious software | 
| US20050033976A1 (en)* | 2003-08-04 | 2005-02-10 | Sbc Knowledge Ventures, L.P. | Host intrusion detection and isolation | 
| US20050033975A1 (en)* | 2001-08-17 | 2005-02-10 | Pasi Lahti | Preventing virus infection in a computer system | 
| US20050033978A1 (en)* | 2003-08-08 | 2005-02-10 | Hyser Chris D. | Method and system for securing a computer system | 
| US20050033980A1 (en)* | 2003-08-07 | 2005-02-10 | Willman Bryan Mark | Projection of trustworthiness from a trusted environment to an untrusted environment | 
| US7483993B2 (en)* | 2001-04-06 | 2009-01-27 | Symantec Corporation | Temporal access control for computer virus prevention | 
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| US5175852A (en) | 1987-02-13 | 1992-12-29 | International Business Machines Corporation | Distributed file access structure lock | 
| US5201043A (en) | 1989-04-05 | 1993-04-06 | Intel Corporation | System using both a supervisor level control bit and a user level control bit to enable/disable memory reference alignment checking | 
| US5144659A (en) | 1989-04-19 | 1992-09-01 | Richard P. Jones | Computer file protection system | 
| JPH0388052A (en) | 1989-08-31 | 1991-04-12 | Toshiba Corp | Security processing method | 
| US5050212A (en) | 1990-06-20 | 1991-09-17 | Apple Computer, Inc. | Method and apparatus for verifying the integrity of a file stored separately from a computer | 
| US5893117A (en) | 1990-08-17 | 1999-04-06 | Texas Instruments Incorporated | Time-stamped database transaction and version management system | 
| US5579509A (en) | 1991-02-08 | 1996-11-26 | International Business Machines Corporation | Apparatus and method for verifying compatibility of system components | 
| ATE124552T1 (en) | 1991-04-01 | 1995-07-15 | Cray Research Inc | CATCHING A PRIVILEGED COMMAND WORD TO CONTROL AN OPERATING SYSTEM. | 
| US5408642A (en) | 1991-05-24 | 1995-04-18 | Symantec Corporation | Method for recovery of a computer program infected by a computer virus | 
| US5355474A (en) | 1991-09-27 | 1994-10-11 | Thuraisngham Bhavani M | System for multilevel secure database management using a knowledge base with release-based and other security constraints for query, response and update modification | 
| US5694590A (en) | 1991-09-27 | 1997-12-02 | The Mitre Corporation | Apparatus and method for the detection of security violations in multilevel secure databases | 
| IL99747A (en) | 1991-10-15 | 1994-12-29 | News Datacom Ltd | File-secure computer system | 
| WO1993013477A1 (en) | 1991-12-23 | 1993-07-08 | Onyx Technologies (Usa) Inc. | Computer protection device | 
| DK170490B1 (en) | 1992-04-28 | 1995-09-18 | Multi Inform As | Data Processing Plant | 
| GB9205774D0 (en) | 1992-03-17 | 1992-04-29 | Int Computers Ltd | Computer security system | 
| US5649095A (en) | 1992-03-30 | 1997-07-15 | Cozza; Paul D. | Method and apparatus for detecting computer viruses through the use of a scan information cache | 
| US5473769A (en) | 1992-03-30 | 1995-12-05 | Cozza; Paul D. | Method and apparatus for increasing the speed of the detecting of computer viruses | 
| US5528490A (en) | 1992-04-10 | 1996-06-18 | Charles E. Hill & Associates, Inc. | Electronic catalog system and method | 
| US5421006A (en) | 1992-05-07 | 1995-05-30 | Compaq Computer Corp. | Method and apparatus for assessing integrity of computer system software | 
| WO1993025024A1 (en) | 1992-05-26 | 1993-12-09 | Cyberlock Data Intelligence, Inc. | Computer virus monitoring system | 
| US5241594A (en) | 1992-06-02 | 1993-08-31 | Hughes Aircraft Company | One-time logon means and methods for distributed computing systems | 
| US5428795A (en) | 1992-07-31 | 1995-06-27 | International Business Machines Corporation | Method of and apparatus for providing automatic security control of distributions within a data processing system | 
| US5339261A (en) | 1992-10-22 | 1994-08-16 | Base 10 Systems, Inc. | System for operating application software in a safety critical environment | 
| US5327563A (en) | 1992-11-13 | 1994-07-05 | Hewlett-Packard | Method for locking software files to a specific storage device | 
| US5359730A (en) | 1992-12-04 | 1994-10-25 | International Business Machines Corporation | Method of operating a data processing system having a dynamic software update facility | 
| JP2501771B2 (en) | 1993-01-19 | 1996-05-29 | インターナショナル・ビジネス・マシーンズ・コーポレイション | Method and apparatus for obtaining multiple valid signatures of an unwanted software entity | 
| US5440723A (en) | 1993-01-19 | 1995-08-08 | International Business Machines Corporation | Automatic immune system for computers and computer networks | 
| US5448668A (en) | 1993-07-08 | 1995-09-05 | Perelson; Alan S. | Method of detecting changes to a collection of digital signals | 
| US5444850A (en) | 1993-08-04 | 1995-08-22 | Trend Micro Devices Incorporated | Method and apparatus for controlling network and workstation access prior to workstation boot | 
| US5615373A (en) | 1993-08-26 | 1997-03-25 | International Business Machines Corporation | Data lock management in a distributed file server system determines variable lock lifetime in response to request to access data object | 
| US5664098A (en) | 1993-09-28 | 1997-09-02 | Bull Hn Information Systems Inc. | Dual decor capability for a host system which runs emulated application programs to enable direct access to host facilities for executing emulated system operations | 
| US5566326A (en) | 1993-09-28 | 1996-10-15 | Bull Hn Information Systems Inc. | Copy file mechanism for transferring files between a host system and an emulated file system | 
| US5675771A (en) | 1993-09-28 | 1997-10-07 | Bull Hn Information Systems Inc. | Mechanism for enabling emulation system users to directly invoke a number of host system facilities for executing host procedures either synchronously or asynchronously in a secure manner through automatically created shell mechanisms | 
| US5983012A (en) | 1993-09-28 | 1999-11-09 | Bull Hn Information Systems Inc. | Executing programs of a first system on a second system | 
| US5572711A (en) | 1993-09-28 | 1996-11-05 | Bull Hn Information Systems Inc. | Mechanism for linking together the files of emulated and host system for access by emulated system users | 
| US5475826A (en) | 1993-11-19 | 1995-12-12 | Fischer; Addison M. | Method for protecting a volatile file using a single hash | 
| US5584023A (en) | 1993-12-27 | 1996-12-10 | Hsu; Mike S. C. | Computer system including a transparent and secure file transform mechanism | 
| US5689700A (en) | 1993-12-29 | 1997-11-18 | Microsoft Corporation | Unification of directory service with file system services | 
| US6119151A (en)* | 1994-03-07 | 2000-09-12 | International Business Machines Corp. | System and method for efficient cache management in a distributed file system | 
| US6760840B1 (en) | 1994-03-15 | 2004-07-06 | Kabushiki Kaisha Toshiba | File editing system and shared file editing system with file content secrecy, file version management, and asynchronous editing | 
| DE69529635T2 (en) | 1994-03-15 | 2003-10-23 | Toshiba Kawasaki Kk | Share a file system with secret file content, version management and asynchronous editing | 
| US6732358B1 (en) | 1994-03-24 | 2004-05-04 | Ncr Corporation | Automatic updating of computer software | 
| US5572590A (en) | 1994-04-12 | 1996-11-05 | International Business Machines Corporation | Discrimination of malicious changes to digital information using multiple signatures | 
| US5802275A (en) | 1994-06-22 | 1998-09-01 | Lucent Technologies Inc. | Isolation of non-secure software from secure software to limit virus infection | 
| US5778222A (en) | 1994-06-27 | 1998-07-07 | International Business Machines Corporation | Method and system for managing access to objects | 
| US5530757A (en) | 1994-06-28 | 1996-06-25 | International Business Machines Corporation | Distributed fingerprints for information integrity verification | 
| EP0696003B1 (en) | 1994-08-05 | 2001-02-28 | Canon Kabushiki Kaisha | A method and an apparatus for document processing | 
| DE69427347T2 (en) | 1994-08-15 | 2001-10-31 | International Business Machines Corp., Armonk | Process and system for improved access control based on the roles in distributed and centralized computer systems | 
| US5701463A (en) | 1994-09-09 | 1997-12-23 | Cheyenne Advanced Technology Limited | Method of replacing the identity of a file with another as part of a file open request in a computer system | 
| US5537540A (en) | 1994-09-30 | 1996-07-16 | Compaq Computer Corporation | Transparent, secure computer virus detection method and apparatus | 
| US5586301A (en) | 1994-11-09 | 1996-12-17 | Ybm Technologies, Inc. | Personal computer hard disk protection system | 
| US5657470A (en) | 1994-11-09 | 1997-08-12 | Ybm Technologies, Inc. | Personal computer hard disk protection system | 
| JPH08263438A (en) | 1994-11-23 | 1996-10-11 | Xerox Corp | Distribution and use control system of digital work and access control method to digital work | 
| SE517910C2 (en) | 1994-11-29 | 2002-07-30 | Telia Ab | Computer network with access control | 
| JP2912840B2 (en) | 1994-12-07 | 1999-06-28 | 富士通株式会社 | File management system | 
| US5956715A (en) | 1994-12-13 | 1999-09-21 | Microsoft Corporation | Method and system for controlling user access to a resource in a networked computing environment | 
| US5699507A (en) | 1995-01-17 | 1997-12-16 | Lucent Technologies Inc. | Method of identifying similarities in code segments | 
| US5644710A (en) | 1995-02-13 | 1997-07-01 | Eta Technologies Corporation | Personal access management system | 
| US5689564A (en) | 1995-02-13 | 1997-11-18 | Eta Technologies Corporation | Personal access management system | 
| US5727061A (en) | 1995-02-13 | 1998-03-10 | Eta Technologies Corporation | Personal access management systems | 
| US6255943B1 (en) | 1995-03-29 | 2001-07-03 | Cabletron Systems, Inc. | Method and apparatus for distributed object filtering | 
| US5958056A (en) | 1995-05-26 | 1999-09-28 | Intel Corporation | Method and apparatus for selecting operating voltages in a backplane bus | 
| JP4162099B2 (en) | 1995-06-02 | 2008-10-08 | 富士通株式会社 | Device having function to cope with virus infection and storage device thereof | 
| EP0830611A4 (en) | 1995-06-02 | 2007-05-09 | Cisco Systems Inc | Remote monitoring of computer programs | 
| US5678041A (en) | 1995-06-06 | 1997-10-14 | At&T | System and method for restricting user access rights on the internet based on rating information stored in a relational database | 
| US5819275A (en) | 1995-06-07 | 1998-10-06 | Trusted Information Systems, Inc. | System and method for superimposing attributes on hierarchically organized file systems | 
| GB2301912A (en) | 1995-06-09 | 1996-12-18 | Ibm | Security for computer system resources | 
| US5799141A (en) | 1995-06-09 | 1998-08-25 | Qualix Group, Inc. | Real-time data protection system and method | 
| US5826269A (en) | 1995-06-21 | 1998-10-20 | Microsoft Corporation | Electronic mail interface for a network server | 
| EP0752652B1 (en) | 1995-07-03 | 1998-12-16 | Sun Microsystems, Inc. | System and method for implementing a hierarchical policy for computer system administration | 
| US5799315A (en) | 1995-07-07 | 1998-08-25 | Sun Microsystems, Inc. | Method and apparatus for event-tagging data files automatically correlated with a time of occurence in a computer system | 
| JPH0934765A (en) | 1995-07-20 | 1997-02-07 | Fuji Xerox Co Ltd | File managing device | 
| US6061795A (en) | 1995-07-31 | 2000-05-09 | Pinnacle Technology Inc. | Network desktop management security system and method | 
| US5757915A (en) | 1995-08-25 | 1998-05-26 | Intel Corporation | Parameterized hash functions for access control | 
| US5634053A (en) | 1995-08-29 | 1997-05-27 | Hughes Aircraft Company | Federated information management (FIM) system and method for providing data site filtering and translation for heterogeneous databases | 
| JP4014662B2 (en) | 1995-09-18 | 2007-11-28 | ファナック株式会社 | Robot teaching operation panel | 
| US5701458A (en) | 1995-09-20 | 1997-12-23 | International Business Machines Corporation | System and method for managing arbitrary subsets of access control lists in a computer network | 
| US5623600A (en) | 1995-09-26 | 1997-04-22 | Trend Micro, Incorporated | Virus detection and removal apparatus for computer networks | 
| US5826013A (en) | 1995-09-28 | 1998-10-20 | Symantec Corporation | Polymorphic virus detection module | 
| US5854916A (en) | 1995-09-28 | 1998-12-29 | Symantec Corporation | State-based cache for antivirus software | 
| US5696822A (en) | 1995-09-28 | 1997-12-09 | Symantec Corporation | Polymorphic virus detection module | 
| US6366933B1 (en)* | 1995-10-27 | 2002-04-02 | At&T Corp. | Method and apparatus for tracking and viewing changes on the web | 
| US5974568A (en) | 1995-11-17 | 1999-10-26 | Mci Communications Corporation | Hierarchical error reporting system | 
| US5692047A (en) | 1995-12-08 | 1997-11-25 | Sun Microsystems, Inc. | System and method for executing verifiable programs with facility for using non-verifiable programs from trusted sources | 
| US5974455A (en) | 1995-12-13 | 1999-10-26 | Digital Equipment Corporation | System for adding new entry to web page table upon receiving web page including link to another web page not having corresponding entry in web page table | 
| AU1206097A (en) | 1995-12-28 | 1997-07-28 | Eyal Dotan | Method for protecting executable software programs against infection by software viruses | 
| US5966715A (en) | 1995-12-29 | 1999-10-12 | Csg Systems, Inc. | Application and database security and integrity system and method | 
| JPH09233068A (en) | 1996-02-23 | 1997-09-05 | Digital Vision Lab:Kk | Electronic verification system | 
| US5737523A (en) | 1996-03-04 | 1998-04-07 | Sun Microsystems, Inc. | Methods and apparatus for providing dynamic network file system client authentication | 
| GB9605338D0 (en) | 1996-03-13 | 1996-05-15 | Arendee Ltd | Improvements in or relating to computer systems | 
| US5822517A (en) | 1996-04-15 | 1998-10-13 | Dotan; Eyal | Method for detecting infection of software programs by memory resident software viruses | 
| US6138238A (en) | 1997-12-11 | 2000-10-24 | Sun Microsystems, Inc. | Stack-based access control using code and executor identifiers | 
| US20030056103A1 (en) | 2000-12-18 | 2003-03-20 | Levy Kenneth L. | Audio/video commerce application architectural framework | 
| US5978484A (en) | 1996-04-25 | 1999-11-02 | Microsoft Corporation | System and method for safety distributing executable objects | 
| US5974309A (en) | 1996-05-03 | 1999-10-26 | Telefonaktiebolaget L M Ericsson (Publ) | Method and apparatus for facilitating law enforcement agency monitoring of cellular telephone calls | 
| US5815654A (en) | 1996-05-20 | 1998-09-29 | Chrysler Corporation | Method for determining software reliability | 
| DE19625196A1 (en) | 1996-06-24 | 1998-01-02 | Godi Meyer Gizella | Data archiving system | 
| US5987123A (en) | 1996-07-03 | 1999-11-16 | Sun Microsystems, Incorporated | Secure file system | 
| JPH1027123A (en) | 1996-07-11 | 1998-01-27 | Toshiba Corp | Computer software copy protection | 
| US5692124A (en) | 1996-08-30 | 1997-11-25 | Itt Industries, Inc. | Support of limited write downs through trustworthy predictions in multilevel security of computer network communications | 
| US5832208A (en)* | 1996-09-05 | 1998-11-03 | Cheyenne Software International Sales Corp. | Anti-virus agent for use with databases and mail servers | 
| US5845067A (en) | 1996-09-09 | 1998-12-01 | Porter; Jack Edward | Method and apparatus for document management utilizing a messaging system | 
| US5983350A (en) | 1996-09-18 | 1999-11-09 | Secure Computing Corporation | Secure firewall supporting different levels of authentication based on address or encryption status | 
| US5951698A (en) | 1996-10-02 | 1999-09-14 | Trend Micro, Incorporated | System, apparatus and method for the detection and removal of viruses in macros | 
| US5884325A (en) | 1996-10-09 | 1999-03-16 | Oracle Corporation | System for synchronizing shared data between computers | 
| US5832529A (en) | 1996-10-11 | 1998-11-03 | Sun Microsystems, Inc. | Methods, apparatus, and product for distributed garbage collection | 
| US5930792A (en) | 1996-11-07 | 1999-07-27 | Intervoice Limited Partnership | Monitoring and directing flow of HTML documents for security and access | 
| US6802028B1 (en) | 1996-11-11 | 2004-10-05 | Powerquest Corporation | Computer virus detection and removal | 
| US6044381A (en) | 1997-09-11 | 2000-03-28 | Puma Technology, Inc. | Using distributed history files in synchronizing databases | 
| US5878417A (en) | 1996-11-20 | 1999-03-02 | International Business Machines Corporation | Method and apparatus for network security in browser based interfaces | 
| US5958051A (en) | 1996-11-27 | 1999-09-28 | Sun Microsystems, Inc. | Implementing digital signatures for data streams and data archives | 
| US6006228A (en) | 1996-12-11 | 1999-12-21 | Ncr Corporation | Assigning security levels to particular documents on a document by document basis in a database | 
| DK2997A (en) | 1997-01-09 | 1997-01-14 | Hans Jessen | Procedure for preventing unauthorized use of computer program | 
| US6317742B1 (en) | 1997-01-09 | 2001-11-13 | Sun Microsystems, Inc. | Method and apparatus for controlling software access to system resources | 
| US5898836A (en) | 1997-01-14 | 1999-04-27 | Netmind Services, Inc. | Change-detection tool indicating degree and location of change of internet documents by comparison of cyclic-redundancy-check(CRC) signatures | 
| WO1998032073A1 (en) | 1997-01-17 | 1998-07-23 | International Business Machines Corporation | Protecting resources in a distributed computer system | 
| US5956481A (en) | 1997-02-06 | 1999-09-21 | Microsoft Corporation | Method and apparatus for protecting data files on a computer from virus infection | 
| JPH10232878A (en) | 1997-02-19 | 1998-09-02 | Hitachi Ltd | Document management method and apparatus | 
| US5848418A (en) | 1997-02-19 | 1998-12-08 | Watchsoft, Inc. | Electronic file analyzer and selector | 
| US5930801A (en) | 1997-03-07 | 1999-07-27 | Xerox Corporation | Shared-data environment in which each file has independent security properties | 
| US5897637A (en) | 1997-03-07 | 1999-04-27 | Apple Computer, Inc. | System and method for rapidly identifying the existence and location of an item in a file | 
| WO1998047259A2 (en) | 1997-03-10 | 1998-10-22 | Fielder Guy L | File encryption method and system | 
| US6263444B1 (en) | 1997-03-11 | 2001-07-17 | National Aerospace Laboratory Of Science & Technology Agency | Network unauthorized access analysis method, network unauthorized access analysis apparatus utilizing the method, and computer-readable recording medium having network unauthorized access analysis program recorded thereon | 
| US5907848A (en) | 1997-03-14 | 1999-05-25 | Lakeview Technology, Inc. | Method and system for defining transactions from a database log | 
| US5960170A (en) | 1997-03-18 | 1999-09-28 | Trend Micro, Inc. | Event triggered iterative virus detection | 
| US6122631A (en) | 1997-03-28 | 2000-09-19 | International Business Machines Corporation | Dynamic server-managed access control for a distributed file system | 
| US5937160A (en) | 1997-05-01 | 1999-08-10 | Reedy Creek Technologies, Inc. | Systems, methods and computer program products for updating hypertext documents via electronic mail | 
| WO1998050843A1 (en) | 1997-05-02 | 1998-11-12 | Network Associates, Inc. | Process-level data security system | 
| EP0980545B1 (en) | 1997-05-08 | 2001-09-26 | Pinnacle Technology, Inc. | Network desktop management security system and method | 
| US6161145A (en) | 1997-05-08 | 2000-12-12 | International Business Machines Corporation | Updating server-related data at a client | 
| US6123737A (en) | 1997-05-21 | 2000-09-26 | Symantec Corporation | Push deployment of software packages using notification transports | 
| US5948104A (en) | 1997-05-23 | 1999-09-07 | Neuromedical Systems, Inc. | System and method for automated anti-viral file update | 
| US6434607B1 (en) | 1997-06-19 | 2002-08-13 | International Business Machines Corporation | Web server providing role-based multi-level security | 
| US6061686A (en) | 1997-06-26 | 2000-05-09 | Digital Equipment Corporation | Updating a copy of a remote document stored in a local computer system | 
| EP0895149B1 (en) | 1997-07-31 | 2003-09-17 | Siemens Aktiengesellschaft | Computer system for protecting a file and a method for protecting a file | 
| US6282701B1 (en) | 1997-07-31 | 2001-08-28 | Mutek Solutions, Ltd. | System and method for monitoring and analyzing the execution of computer programs | 
| US5919257A (en) | 1997-08-08 | 1999-07-06 | Novell, Inc. | Networked workstation intrusion detection system | 
| US6006329A (en) | 1997-08-11 | 1999-12-21 | Symantec Corporation | Detection of computer viruses spanning multiple data streams | 
| US6249805B1 (en) | 1997-08-12 | 2001-06-19 | Micron Electronics, Inc. | Method and system for filtering unauthorized electronic mail messages | 
| US5978917A (en) | 1997-08-14 | 1999-11-02 | Symantec Corporation | Detection and elimination of macro viruses | 
| US6275938B1 (en) | 1997-08-28 | 2001-08-14 | Microsoft Corporation | Security enhancement for untrusted executable code | 
| US6044469A (en) | 1997-08-29 | 2000-03-28 | Preview Software | Software publisher or distributor configurable software security mechanism | 
| US6226652B1 (en) | 1997-09-05 | 2001-05-01 | International Business Machines Corp. | Method and system for automatically detecting collision and selecting updated versions of a set of files | 
| JP3437065B2 (en) | 1997-09-05 | 2003-08-18 | 富士通株式会社 | Virus removal method, information processing device, and computer-readable recording medium on which virus removal program is recorded | 
| IL126148A (en) | 1997-09-09 | 2004-02-19 | Sanctum Ltd | Method and system for maintaining restricted operating environments for application programs or operating systems | 
| US5983348A (en) | 1997-09-10 | 1999-11-09 | Trend Micro Incorporated | Computer network malicious code scanner | 
| US6154775A (en) | 1997-09-12 | 2000-11-28 | Lucent Technologies Inc. | Methods and apparatus for a computer network firewall with dynamic rule processing with the ability to dynamically alter the operations of rules | 
| US5909689A (en) | 1997-09-18 | 1999-06-01 | Sony Corporation | Automatic update of file versions for files shared by several computers which record in respective file directories temporal information for indicating when the files have been created | 
| US6192108B1 (en) | 1997-09-19 | 2001-02-20 | Mci Communications Corporation | Performing automated testing using automatically generated logs | 
| US6357008B1 (en) | 1997-09-23 | 2002-03-12 | Symantec Corporation | Dynamic heuristic method for detecting computer viruses using decryption exploration and evaluation phases | 
| US5991856A (en) | 1997-09-30 | 1999-11-23 | Network Associates, Inc. | System and method for computer operating system protection | 
| US5924096A (en) | 1997-10-15 | 1999-07-13 | Novell, Inc. | Distributed database using indexed into tags to tracks events according to type, update cache, create virtual update log on demand | 
| EP0911827B1 (en) | 1997-10-21 | 2011-11-30 | Sony Corporation | Recording and/or reproduction apparatus, file management method and providing medium | 
| US6081894A (en) | 1997-10-22 | 2000-06-27 | Rvt Technologies, Inc. | Method and apparatus for isolating an encrypted computer system upon detection of viruses and similar data | 
| US6128774A (en) | 1997-10-28 | 2000-10-03 | Necula; George C. | Safe to execute verification of software | 
| US5991772A (en) | 1997-10-31 | 1999-11-23 | Oracle Corporation | Method and apparatus for restoring a portion of a database | 
| US6073128A (en) | 1997-10-31 | 2000-06-06 | Oracle Corporation | Method and apparatus for identifying files used to restore a file | 
| US7092914B1 (en) | 1997-11-06 | 2006-08-15 | Intertrust Technologies Corporation | Methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information | 
| US6119165A (en) | 1997-11-17 | 2000-09-12 | Trend Micro, Inc. | Controlled distribution of application programs in a computer network | 
| US6397329B1 (en) | 1997-11-21 | 2002-05-28 | Telcordia Technologies, Inc. | Method for efficiently revoking digital identities | 
| US6108799A (en) | 1997-11-21 | 2000-08-22 | International Business Machines Corporation | Automated sample creation of polymorphic and non-polymorphic marcro viruses | 
| US6094731A (en) | 1997-11-24 | 2000-07-25 | Symantec Corporation | Antivirus accelerator for computer networks | 
| US6208986B1 (en) | 1997-12-15 | 2001-03-27 | International Business Machines Corporation | Web interface and method for accessing and displaying directory information | 
| US6035423A (en) | 1997-12-31 | 2000-03-07 | Network Associates, Inc. | Method and system for providing automated updating and upgrading of antivirus applications using a computer network | 
| US5999932A (en) | 1998-01-13 | 1999-12-07 | Bright Light Technologies, Inc. | System and method for filtering unsolicited electronic mail messages using data matching and heuristic processing | 
| US6122738A (en) | 1998-01-22 | 2000-09-19 | Symantec Corporation | Computer file integrity verification | 
| US6141771A (en) | 1998-02-06 | 2000-10-31 | International Business Machines Corporation | Method and system for providing a trusted machine state | 
| US5987610A (en) | 1998-02-12 | 1999-11-16 | Ameritech Corporation | Computer virus screening methods and systems | 
| US6205482B1 (en) | 1998-02-19 | 2001-03-20 | Ameritech Corporation | System and method for executing a request from a client application | 
| US6457130B2 (en) | 1998-03-03 | 2002-09-24 | Network Appliance, Inc. | File access control in a multi-protocol file server | 
| US20010044901A1 (en) | 1998-03-24 | 2001-11-22 | Symantec Corporation | Bubble-protected system for automatic decryption of file data on a per-use basis and automatic re-encryption | 
| US6052531A (en) | 1998-03-25 | 2000-04-18 | Symantec Corporation | Multi-tiered incremental software updating | 
| JPH11282779A (en) | 1998-03-27 | 1999-10-15 | Matsushita Electric Ind Co Ltd | File distribution system | 
| US6263342B1 (en) | 1998-04-01 | 2001-07-17 | International Business Machines Corp. | Federated searching of heterogeneous datastores using a federated datastore object | 
| US6272488B1 (en) | 1998-04-01 | 2001-08-07 | International Business Machines Corporation | Managing results of federated searches across heterogeneous datastores with a federated collection object | 
| US6098079A (en) | 1998-04-02 | 2000-08-01 | Mitsubishi Electric Information Technology Center America, Inc. (Ita) | File version reconciliation using hash codes | 
| US6230316B1 (en) | 1998-04-17 | 2001-05-08 | Symantec Corporation | Patching rebased and realigned executable files | 
| GB2336696B (en) | 1998-04-24 | 2002-12-18 | Dialog Corp Plc The | Analysing data files | 
| US6154751A (en) | 1998-05-14 | 2000-11-28 | International Business Machines Corporation | Method for executing a user-requested CGI program in a new authentication context while protecting operation of a default web server program | 
| US6792540B1 (en) | 1998-05-28 | 2004-09-14 | Oracle International Corporation | Data replication security | 
| US6134447A (en) | 1998-05-29 | 2000-10-17 | Ericsson Inc. | System and method for monitoring and barring location applications | 
| US6279111B1 (en) | 1998-06-12 | 2001-08-21 | Microsoft Corporation | Security model using restricted tokens | 
| US6308274B1 (en) | 1998-06-12 | 2001-10-23 | Microsoft Corporation | Least privilege via restricted tokens | 
| US6256393B1 (en) | 1998-06-23 | 2001-07-03 | General Instrument Corporation | Authorization and access control of software object residing in set-top terminals | 
| US6638314B1 (en) | 1998-06-26 | 2003-10-28 | Microsoft Corporation | Method of web crawling utilizing crawl numbers | 
| DE19838605A1 (en) | 1998-08-25 | 2000-03-02 | Siemens Ag | Method and device for forming a detection variable that enables detection of digital signing of an electronic file, and method and device for detection that an electronic file has been digitally signed | 
| US6115709A (en) | 1998-09-18 | 2000-09-05 | Tacit Knowledge Systems, Inc. | Method and system for constructing a knowledge profile of a user having unrestricted and restricted access portions according to respective levels of confidence of content of the portions | 
| US6397381B1 (en) | 1998-09-21 | 2002-05-28 | Microsoft Corporation | System and method for repairing a damaged application program | 
| US6237144B1 (en) | 1998-09-21 | 2001-05-22 | Microsoft Corporation | Use of relational databases for software installation | 
| US6401210B1 (en) | 1998-09-23 | 2002-06-04 | Intel Corporation | Method of managing computer virus infected files | 
| US6711583B2 (en) | 1998-09-30 | 2004-03-23 | International Business Machines Corporation | System and method for detecting and repairing document-infecting viruses using dynamic heuristics | 
| US6301670B1 (en) | 1998-10-06 | 2001-10-09 | Ricoh Corporation | Method and apparatus for erasing data when a problem is identified | 
| US6205558B1 (en) | 1998-10-07 | 2001-03-20 | Symantec Corporation | Recovery of file systems after modification failure | 
| US6230288B1 (en) | 1998-10-29 | 2001-05-08 | Network Associates, Inc. | Method of treating whitespace during virus detection | 
| US6598090B2 (en) | 1998-11-03 | 2003-07-22 | International Business Machines Corporation | Centralized control of software for administration of a distributed computing environment | 
| US6378069B1 (en) | 1998-11-04 | 2002-04-23 | Nortel Networks Limited | Apparatus and methods for providing software updates to devices in a communication network | 
| US6334150B1 (en) | 1998-11-30 | 2001-12-25 | International Business Machines Corporation | Data processing system and method for remotely disabling a client computer system | 
| US6263388B1 (en) | 1998-11-30 | 2001-07-17 | International Business Machines Corporation | Data processing system and method for remotely disabling network activity in a client computer system | 
| US6163859A (en) | 1998-12-02 | 2000-12-19 | Support.Com, Inc. | Software vault | 
| US6370648B1 (en) | 1998-12-08 | 2002-04-09 | Visa International Service Association | Computer network intrusion detection | 
| CA2292041A1 (en) | 1998-12-22 | 2000-06-22 | Scott Alan Thomson | Software program protection mechanism | 
| US6311187B1 (en) | 1998-12-29 | 2001-10-30 | Sun Microsystems, Inc. | Propogating updates efficiently in hierarchically structured data under a push model | 
| US20030191957A1 (en) | 1999-02-19 | 2003-10-09 | Ari Hypponen | Distributed computer virus detection and scanning | 
| EP1159799B1 (en) | 1999-02-26 | 2006-07-26 | Bitwise Designs, Inc. | Digital file management and imaging system and method including secure file marking | 
| US6735766B1 (en) | 1999-03-03 | 2004-05-11 | Microsoft Corporation | Method and computer-readable medium for installing an upgrade to an application program | 
| WO2000054385A1 (en) | 1999-03-10 | 2000-09-14 | Preview Systems, Inc. | User transparent software malfunction detection and reporting | 
| US6725377B1 (en) | 1999-03-12 | 2004-04-20 | Networks Associates Technology, Inc. | Method and system for updating anti-intrusion software | 
| US6829708B1 (en) | 1999-03-27 | 2004-12-07 | Microsoft Corporation | Specifying security for an element by assigning a scaled value representative of the relative security thereof | 
| US6816596B1 (en) | 2000-01-14 | 2004-11-09 | Microsoft Corporation | Encrypting a digital object based on a key ID selected therefor | 
| CA2365245C (en) | 1999-03-31 | 2008-12-09 | British Telecommunications Public Limited Company | Server computer for guaranteeing files integrity | 
| EP1069745A1 (en) | 1999-07-13 | 2001-01-17 | BRITISH TELECOMMUNICATIONS public limited company | Server computer providing integrity of files stored in it | 
| US6775779B1 (en) | 1999-04-06 | 2004-08-10 | Microsoft Corporation | Hierarchical trusted code for content protection in computers | 
| JP3056732B1 (en) | 1999-04-09 | 2000-06-26 | コナミ株式会社 | Computer system, computer program execution method, and computer program recording medium | 
| WO2000064095A1 (en) | 1999-04-15 | 2000-10-26 | Motorola Inc. | Electronic document protection system | 
| US6721795B1 (en) | 1999-04-26 | 2004-04-13 | America Online, Inc. | Data transfer server | 
| WO2000067130A1 (en) | 1999-04-30 | 2000-11-09 | Fujitsu Limited | File managing system | 
| US6434615B1 (en) | 1999-04-30 | 2002-08-13 | Compaq Information Technologies Group, L.P. | Method and apparatus for remote computer management using HTML in a web browser application and an internet server extension on an internet server API-compliant web server | 
| JP4212717B2 (en) | 1999-04-30 | 2009-01-21 | 富士通株式会社 | File processing unit processing method | 
| US6654746B1 (en) | 1999-05-03 | 2003-11-25 | Symantec Corporation | Methods and apparatuses for single-connection file synchronization workgroup file update | 
| US6574657B1 (en) | 1999-05-03 | 2003-06-03 | Symantec Corporation | Methods and apparatuses for file synchronization and updating using a signature list | 
| US6681331B1 (en) | 1999-05-11 | 2004-01-20 | Cylant, Inc. | Dynamic software system intrusion detection | 
| WO2000072200A1 (en) | 1999-05-21 | 2000-11-30 | Infraworks Corporation | Method and apparatus for securing files | 
| GB2350449A (en) | 1999-05-27 | 2000-11-29 | Ibm | Detecting replication of a computer virus using a counter virus | 
| US6618810B1 (en) | 1999-05-27 | 2003-09-09 | Dell Usa, L.P. | Bios based method to disable and re-enable computers | 
| US20020101998A1 (en) | 1999-06-10 | 2002-08-01 | Chee-Hong Wong | Fast escrow delivery | 
| US6594671B1 (en) | 1999-06-14 | 2003-07-15 | International Business Machines Corporation | Separating privileged functions from non-privileged functions in a server instance | 
| TW462025B (en) | 1999-06-23 | 2001-11-01 | Micro Star Int Co Ltd | BIOS virus protection method | 
| NL1012435C2 (en) | 1999-06-25 | 2000-12-28 | Koninkl Kpn Nv | System for secure storage and management in a TTP server. | 
| US6643648B1 (en) | 1999-06-30 | 2003-11-04 | Raf Technology, Inc. | Secure, limited-access database system and method | 
| JP2003503795A (en) | 1999-06-30 | 2003-01-28 | マイクロソフト コーポレイション | Method and system for reporting and resolving support incidents | 
| EP1076336A3 (en) | 1999-07-12 | 2002-01-16 | DCS Desarrollos Tecnologicos S.A. | Method and device for storing, selecting and playing digital audio in magnetic memory and electronic security system against unauthorized copies | 
| AU6222900A (en) | 1999-07-20 | 2001-02-05 | Getlivemusic.Com | Systems for digital watermarking and distribution of recorded content | 
| US6779117B1 (en) | 1999-07-23 | 2004-08-17 | Cybersoft, Inc. | Authentication program for a computer operating system | 
| AU779120B2 (en) | 1999-08-02 | 2005-01-06 | Harris Interactive, Inc. | System for protecting information over the internet | 
| US20020009622A1 (en) | 1999-08-03 | 2002-01-24 | Goodson David M. | Sprayable phosphate cementitious coatings and a method and apparatus for the production thereof | 
| GB2354347B (en) | 1999-08-04 | 2003-09-03 | Internat Federation Of The Pho | Reproduction control system | 
| US6493744B1 (en) | 1999-08-16 | 2002-12-10 | International Business Machines Corporation | Automatic rating and filtering of data files for objectionable content | 
| US6959382B1 (en) | 1999-08-16 | 2005-10-25 | Accela, Inc. | Digital signature service | 
| US6647400B1 (en) | 1999-08-30 | 2003-11-11 | Symantec Corporation | System and method for analyzing filesystems to detect intrusions | 
| US6826697B1 (en) | 1999-08-30 | 2004-11-30 | Symantec Corporation | System and method for detecting buffer overflow attacks | 
| US6301666B1 (en) | 1999-08-31 | 2001-10-09 | Everdream, Inc. | Method and apparatus for remotely enabling a preinstalled and previously disabled application on a computer system | 
| US6976165B1 (en) | 1999-09-07 | 2005-12-13 | Emc Corporation | System and method for secure storage, transfer and retrieval of content addressable information | 
| US6792416B2 (en) | 1999-09-21 | 2004-09-14 | International Business Machines Corporation | Managing results of federated searches across heterogeneous datastores with a federated result set cursor object | 
| US8914361B2 (en) | 1999-09-22 | 2014-12-16 | Google Inc. | Methods and systems for determining a meaning of a document to match the document to content | 
| US6618727B1 (en) | 1999-09-22 | 2003-09-09 | Infoglide Corporation | System and method for performing similarity searching | 
| US6324537B1 (en) | 1999-09-30 | 2001-11-27 | M-Systems Flash Disk Pioneers Ltd. | Device, system and method for data access control | 
| US7043553B2 (en) | 1999-10-07 | 2006-05-09 | Cisco Technology, Inc. | Method and apparatus for securing information access | 
| US6594780B1 (en) | 1999-10-19 | 2003-07-15 | Inasoft, Inc. | Operating system and data protection | 
| US6430561B1 (en) | 1999-10-29 | 2002-08-06 | International Business Machines Corporation | Security policy for protection of files on a storage device | 
| US6453347B1 (en) | 1999-10-29 | 2002-09-17 | Mcafee.Com, Inc. | Active marketing based on client computer configurations | 
| US6631480B2 (en) | 1999-11-10 | 2003-10-07 | Symantec Corporation | Methods and systems for protecting data from potential corruption by a crashed computer program | 
| US6738775B2 (en) | 1999-11-30 | 2004-05-18 | Base One International Corp. | Database communication system and method for communicating with a database | 
| US6728886B1 (en) | 1999-12-01 | 2004-04-27 | Trend Micro Incorporated | Distributed virus scanning arrangements and methods therefor | 
| US6550061B1 (en) | 1999-12-02 | 2003-04-15 | Dell Usa, L.P. | System and method for modifying configuration files in a secured operating system | 
| US6742023B1 (en) | 2000-04-28 | 2004-05-25 | Roxio, Inc. | Use-sensitive distribution of data files between users | 
| JP3546787B2 (en)* | 1999-12-16 | 2004-07-28 | インターナショナル・ビジネス・マシーンズ・コーポレーション | Access control system, access control method, and storage medium | 
| ES2304929T3 (en) | 1999-12-21 | 2008-11-01 | Contentguard Holdings, Inc. | METHOD TO TRANSFER THE RIGHTS TO DECODE MONTHLY. | 
| WO2001048582A2 (en) | 1999-12-24 | 2001-07-05 | Ravenpack Ag | Method and device for presenting data to a user | 
| GB2353372B (en) | 1999-12-24 | 2001-08-22 | F Secure Oyj | Remote computer virus scanning | 
| WO2001048634A2 (en) | 1999-12-27 | 2001-07-05 | Texar Software Corp. | Virtual resource attribute directory | 
| US6654888B1 (en) | 1999-12-31 | 2003-11-25 | International Business Machines Corporation | Installing and controlling trial software | 
| EP1315067B1 (en) | 2000-01-06 | 2006-07-26 | International Business Machines Corporation | Method and system for using a virus free file certificate | 
| US6735700B1 (en) | 2000-01-11 | 2004-05-11 | Network Associates Technology, Inc. | Fast virus scanning using session stamping | 
| US6763466B1 (en) | 2000-01-11 | 2004-07-13 | Networks Associates Technology, Inc. | Fast virus scanning | 
| US6772340B1 (en) | 2000-01-14 | 2004-08-03 | Microsoft Corporation | Digital rights management system operating on computing device and having black box tied to computing device | 
| US6785818B1 (en) | 2000-01-14 | 2004-08-31 | Symantec Corporation | Thwarting malicious registry mapping modifications and map-loaded module masquerade attacks | 
| WO2001053909A2 (en) | 2000-01-18 | 2001-07-26 | Telcordia Technologies, Inc. | Method and systems for data security | 
| US6721767B2 (en) | 2000-01-31 | 2004-04-13 | Commvault Systems, Inc. | Application specific rollback in a computer system | 
| US7293175B2 (en) | 2000-06-29 | 2007-11-06 | Lockheed Martin Corporation | Automatic information sanitizer | 
| US6704730B2 (en) | 2000-02-18 | 2004-03-09 | Avamar Technologies, Inc. | Hash file system and method for use in a commonality factoring system | 
| US6560776B1 (en) | 2000-02-18 | 2003-05-06 | Avaya Technology Corp. | Software installation verification tool | 
| US6594665B1 (en) | 2000-02-18 | 2003-07-15 | Intel Corporation | Storing hashed values of data in media to allow faster searches and comparison of data | 
| US20010032188A1 (en) | 2000-02-25 | 2001-10-18 | Yoshiyuki Miyabe | Information distribution system | 
| IL151455A0 (en) | 2000-03-03 | 2003-04-10 | Sanctum Ltd | System for determining web application vulnerabilities | 
| CA2299946A1 (en) | 2000-03-03 | 2001-09-03 | Destiny Software Productions Inc. | Digital media distribution method and system | 
| US6775780B1 (en) | 2000-03-16 | 2004-08-10 | Networks Associates Technology, Inc. | Detecting malicious software by analyzing patterns of system calls generated during emulation | 
| AU2001250952A1 (en) | 2000-03-22 | 2001-10-03 | Interwoven, Inc. | Method and apparatus for storing changes to file attributes without having to store an additional copy of the file contents | 
| US6842861B1 (en) | 2000-03-24 | 2005-01-11 | Networks Associates Technology, Inc. | Method and system for detecting viruses on handheld computers | 
| WO2001073533A1 (en) | 2000-03-28 | 2001-10-04 | The Wingard Company | System and method for safeguarding electronic files and digital information in a network environment | 
| US6658406B1 (en) | 2000-03-29 | 2003-12-02 | Microsoft Corporation | Method for selecting terms from vocabularies in a category-based system | 
| US6856993B1 (en) | 2000-03-30 | 2005-02-15 | Microsoft Corporation | Transactional file system | 
| US6748534B1 (en) | 2000-03-31 | 2004-06-08 | Networks Associates, Inc. | System and method for partitioned distributed scanning of a large dataset for viruses and other malware | 
| US6826609B1 (en) | 2000-03-31 | 2004-11-30 | Tumbleweed Communications Corp. | Policy enforcement in a secure data file delivery system | 
| US6823398B1 (en) | 2000-03-31 | 2004-11-23 | Dphi Acquisitions, Inc. | File system management embedded in a storage device | 
| US6820082B1 (en) | 2000-04-03 | 2004-11-16 | Allegis Corporation | Rule based database security system and method | 
| KR20010096814A (en) | 2000-04-14 | 2001-11-08 | 홍기융 | Digital Signature Certificate Based Security Kernel Method for File System Protection | 
| WO2001082033A1 (en) | 2000-04-19 | 2001-11-01 | Syntion Ag | Method for detecting the utilization of a computer program in a billable manner | 
| US6640317B1 (en) | 2000-04-20 | 2003-10-28 | International Business Machines Corporation | Mechanism for automated generic application damage detection and repair in strongly encapsulated application | 
| US6754718B1 (en) | 2000-05-10 | 2004-06-22 | Emc Corporation | Pushing attribute information to storage devices for network topology access | 
| US20010042204A1 (en) | 2000-05-11 | 2001-11-15 | David Blaker | Hash-ordered databases and methods, systems and computer program products for use of a hash-ordered database | 
| DE60128290T2 (en) | 2000-05-11 | 2007-08-30 | Matsushita Electric Industrial Co., Ltd., Kadoma | Device for file management | 
| US20020062258A1 (en) | 2000-05-18 | 2002-05-23 | Bailey Steven C. | Computer-implemented procurement of items using parametric searching | 
| MXPA02011760A (en) | 2000-05-31 | 2003-04-10 | Matsushita Electric Ind Co Ltd | Information recording medium, information recording method, information recording apparatus, information reproducing method, and information reproducing apparatus. | 
| US6640287B2 (en) | 2000-06-10 | 2003-10-28 | Hewlett-Packard Development Company, L.P. | Scalable multiprocessor system and cache coherence method incorporating invalid-to-dirty requests | 
| US6711572B2 (en) | 2000-06-14 | 2004-03-23 | Xosoft Inc. | File system for distributing content in a data network and related methods | 
| US6785721B1 (en)* | 2000-06-19 | 2004-08-31 | International Business Machines Corporation | System and method for providing a distributable runtime that deploys web applications and services from a workflow, enterprise, and mail-enabled web application server and platform | 
| US7669238B2 (en) | 2000-06-21 | 2010-02-23 | Microsoft Corporation | Evidence-based application security | 
| GB2364404B (en) | 2000-07-01 | 2002-10-02 | Marconi Comm Ltd | Method of detecting malicious code | 
| US7251728B2 (en) | 2000-07-07 | 2007-07-31 | Message Secure Corporation | Secure and reliable document delivery using routing lists | 
| US6470329B1 (en) | 2000-07-11 | 2002-10-22 | Sun Microsystems, Inc. | One-way hash functions for distributed data synchronization | 
| US7210040B2 (en) | 2000-07-14 | 2007-04-24 | Computer Associates Think, Inc. | Detection of suspicious privileged access to restricted computer resources | 
| US7350204B2 (en) | 2000-07-24 | 2008-03-25 | Microsoft Corporation | Policies for secure software execution | 
| US6711557B1 (en) | 2000-08-14 | 2004-03-23 | Adobe Systems Incorporated | Client-based background update monitoring | 
| US6732125B1 (en) | 2000-09-08 | 2004-05-04 | Storage Technology Corporation | Self archiving log structured volume with intrinsic data protection | 
| US6785732B1 (en) | 2000-09-11 | 2004-08-31 | International Business Machines Corporation | Web server apparatus and method for virus checking | 
| JP2004509398A (en) | 2000-09-14 | 2004-03-25 | プロビックス・インコーポレイテッド | System for establishing an audit trail for the protection of objects distributed over a network | 
| US6802012B1 (en) | 2000-10-03 | 2004-10-05 | Networks Associates Technology, Inc. | Scanning computer files for unwanted properties | 
| US6757830B1 (en) | 2000-10-03 | 2004-06-29 | Networks Associates Technology, Inc. | Detecting unwanted properties in received email messages | 
| GB0024919D0 (en) | 2000-10-11 | 2000-11-22 | Sealedmedia Ltd | Method of further securing an operating system | 
| US20020048372A1 (en) | 2000-10-19 | 2002-04-25 | Eng-Whatt Toh | Universal signature object for digital data | 
| US6970939B2 (en) | 2000-10-26 | 2005-11-29 | Intel Corporation | Method and apparatus for large payload distribution in a network | 
| EP1202148A1 (en) | 2000-10-31 | 2002-05-02 | Hewlett-Packard Company, A Delaware Corporation | Virus check on altered data | 
| EP1330890B1 (en) | 2000-11-03 | 2008-06-25 | Digital Authentication Technologies Inc. | Electronic file protection using location | 
| US7343324B2 (en) | 2000-11-03 | 2008-03-11 | Contentguard Holdings Inc. | Method, system, and computer readable medium for automatically publishing content | 
| US6715106B1 (en) | 2000-11-10 | 2004-03-30 | Dell Products L.P. | Bios corruption detection system and method | 
| US7322047B2 (en) | 2000-11-13 | 2008-01-22 | Digital Doors, Inc. | Data security system and method associated with data mining | 
| EP1350167A4 (en) | 2000-11-16 | 2007-10-24 | Dlj Long Term Invest Corp | System and method for application-level security | 
| US7660902B2 (en) | 2000-11-20 | 2010-02-09 | Rsa Security, Inc. | Dynamic file access control and management | 
| JP2004515166A (en) | 2000-11-28 | 2004-05-20 | スイベル テクノロジーズ リミテッド | Secure file transfer method and system | 
| US7003551B2 (en) | 2000-11-30 | 2006-02-21 | Bellsouth Intellectual Property Corp. | Method and apparatus for minimizing storage of common attachment files in an e-mail communications server | 
| EP1340170A1 (en) | 2000-12-08 | 2003-09-03 | IPC Gmbh | Method and system for supplying information via a communication network | 
| US7150045B2 (en) | 2000-12-14 | 2006-12-12 | Widevine Technologies, Inc. | Method and apparatus for protection of electronic media | 
| US6708174B1 (en) | 2000-12-20 | 2004-03-16 | I2 Technologies, Inc. | System and method for retrieving information according to improved matching criteria | 
| US7296070B2 (en) | 2000-12-22 | 2007-11-13 | Tier-3 Pty. Ltd. | Integrated monitoring system | 
| US6985586B2 (en) | 2000-12-22 | 2006-01-10 | Nagracard S.A. | Distributed information and storage system | 
| US7058667B2 (en) | 2000-12-27 | 2006-06-06 | Microsoft Corporation | Method and system for creating and maintaining version-specific properties in a file | 
| US20020087876A1 (en) | 2000-12-28 | 2002-07-04 | Larose Gordon Edward | Adaptive software installation process supporting multiple layers of security-related attributes | 
| GB2371125A (en) | 2001-01-13 | 2002-07-17 | Secr Defence | Computer protection system | 
| US6684224B2 (en) | 2001-01-16 | 2004-01-27 | Chipdata, Inc. | Remote database update method and apparatus | 
| US7386513B2 (en) | 2001-01-17 | 2008-06-10 | Contentguard Holdings, Inc. | Networked services licensing system and method | 
| EP1225513A1 (en) | 2001-01-19 | 2002-07-24 | Eyal Dotan | Method for protecting computer programs and data from hostile code | 
| US7057993B2 (en) | 2001-01-29 | 2006-06-06 | Eastman Kodak Company | Copy protection using multiple security levels on a programmable CD-ROM | 
| US7406529B2 (en) | 2001-02-09 | 2008-07-29 | Yahoo! Inc. | System and method for detecting and verifying digitized content over a computer network | 
| US20020111911A1 (en) | 2001-02-13 | 2002-08-15 | Kennedy Kelli Hodge | Document distribution system and method with consolidated document services management | 
| US7213146B2 (en) | 2001-02-20 | 2007-05-01 | Hewlett-Packard Development Company, L.P. | System and method for establishing security profiles of computers | 
| US7272724B2 (en) | 2001-02-20 | 2007-09-18 | Mcafee, Inc. | User alerts in an anti computer virus system | 
| GB2372595A (en) | 2001-02-23 | 2002-08-28 | Hewlett Packard Co | Method of and apparatus for ascertaining the status of a data processing environment. | 
| US6829355B2 (en) | 2001-03-05 | 2004-12-07 | The United States Of America As Represented By The National Security Agency | Device for and method of one-way cryptographic hashing | 
| US7404212B2 (en) | 2001-03-06 | 2008-07-22 | Cybersoft, Inc. | Apparatus and methods for intercepting, examining and controlling code, data and files and their transfer | 
| US7373643B2 (en)* | 2001-03-06 | 2008-05-13 | Cybersoft, Inc. | Apparatus, methods and articles of manufacture for data transmission | 
| US7647402B2 (en) | 2001-03-08 | 2010-01-12 | International Business Machines Corporation | Protecting contents of computer data files from suspected intruders by renaming and hiding data files subjected to intrusion | 
| AU2002252287A1 (en) | 2001-03-12 | 2002-09-24 | Smart Mediary Systems, Llc | Many-to-many mediated commercial electronic publishing | 
| US7284271B2 (en) | 2001-03-14 | 2007-10-16 | Microsoft Corporation | Authorizing a requesting entity to operate upon data structures | 
| US7302584B2 (en) | 2001-03-16 | 2007-11-27 | Mcafee, Inc. | Mechanisms for banning computer programs from use | 
| EP1372063A4 (en) | 2001-03-19 | 2008-03-19 | Sony Corp | Software updating system, software updating method, and software updating program | 
| US20020144130A1 (en) | 2001-03-29 | 2002-10-03 | Koninklijke Philips Electronics N.V. | Apparatus and methods for detecting illicit content that has been imported into a secure domain | 
| US7114184B2 (en) | 2001-03-30 | 2006-09-26 | Computer Associates Think, Inc. | System and method for restoring computer systems damaged by a malicious computer program | 
| IL142487A0 (en) | 2001-04-05 | 2003-09-17 | Hexalock Ltd | Method and system for protecting data | 
| JP3946965B2 (en) | 2001-04-09 | 2007-07-18 | ソニー株式会社 | Recording apparatus, recording method, recording medium, and program for recording information protecting intangible property rights | 
| US6966000B2 (en) | 2001-04-13 | 2005-11-15 | Ge Medical Technology Services, Inc. | Method and system to remotely grant limited access to software options resident on a device | 
| US7502939B2 (en) | 2001-04-19 | 2009-03-10 | Cybersoft, Inc. | Software virus detection methods and apparatus | 
| US7043634B2 (en) | 2001-05-15 | 2006-05-09 | Mcafee, Inc. | Detecting malicious alteration of stored computer files | 
| US7188368B2 (en) | 2001-05-25 | 2007-03-06 | Lenovo (Singapore) Pte. Ltd. | Method and apparatus for repairing damage to a computer system using a system rollback mechanism | 
| US6643653B1 (en) | 2001-06-01 | 2003-11-04 | Oracle International Corporation | Method and apparatus for identifying a data sequence related to a given data sequence | 
| DE60203711T2 (en) | 2001-06-12 | 2006-03-02 | International Business Machines Corp. | METHOD FOR AUTHENTICATING MULTIPLE FILES ASSOCIATED WITH A TEXT DOCUMENT | 
| US7213148B2 (en) | 2001-06-13 | 2007-05-01 | Corrent Corporation | Apparatus and method for a hash processing system using integrated message digest and secure hash architectures | 
| US7249255B2 (en) | 2001-06-13 | 2007-07-24 | Corrent Corporation | Apparatus and method for a hash processing system using multiple hash storage areas | 
| US20020194490A1 (en) | 2001-06-18 | 2002-12-19 | Avner Halperin | System and method of virus containment in computer networks | 
| US7203966B2 (en) | 2001-06-27 | 2007-04-10 | Microsoft Corporation | Enforcement architecture and method for digital rights management system for roaming a license to a plurality of user devices | 
| FI118358B (en) | 2001-06-29 | 2007-10-15 | Sanako Oy | A method for controlling the use of digital media content | 
| KR100762276B1 (en) | 2001-07-17 | 2007-10-01 | 샤프 가부시키가이샤 | Apparatus and method for generating forgery detection data of encrypted data in process | 
| US7487544B2 (en) | 2001-07-30 | 2009-02-03 | The Trustees Of Columbia University In The City Of New York | System and methods for detection of new malicious executables | 
| US7146524B2 (en) | 2001-08-03 | 2006-12-05 | Isilon Systems, Inc. | Systems and methods for providing a distributed file system incorporating a virtual hot spare | 
| AU2002323431A1 (en) | 2001-08-27 | 2003-03-10 | Dataplay, Inc. | A secure access method and system | 
| US6662198B2 (en)* | 2001-08-30 | 2003-12-09 | Zoteca Inc. | Method and system for asynchronous transmission, backup, distribution of data and file sharing | 
| US6826601B2 (en) | 2001-09-06 | 2004-11-30 | Bea Systems, Inc. | Exactly one cache framework | 
| US7234167B2 (en) | 2001-09-06 | 2007-06-19 | Mcafee, Inc. | Automatic builder of detection and cleaning routines for computer viruses | 
| US7260725B2 (en) | 2001-09-14 | 2007-08-21 | Computer Associates Think, Inc. | Virus detection system | 
| US7266844B2 (en) | 2001-09-27 | 2007-09-04 | Mcafee, Inc. | Heuristic detection of polymorphic computer viruses based on redundancy in viral code | 
| US20030074578A1 (en) | 2001-10-16 | 2003-04-17 | Richard Ford | Computer virus containment | 
| US6654751B1 (en) | 2001-10-18 | 2003-11-25 | Networks Associates Technology, Inc. | Method and apparatus for a virus information patrol | 
| FR2841409B1 (en) | 2001-10-19 | 2004-07-30 | Marc Viot | DATA PROTECTION METHOD AND DEVICE | 
| WO2003036505A1 (en) | 2001-10-24 | 2003-05-01 | Bea Systems, Inc. | System and method for delegated administration | 
| US7444393B2 (en) | 2001-10-30 | 2008-10-28 | Keicy K. Chung | Read-only storage device having network interface, a system including the device, and a method of distributing files over a network | 
| US20030159060A1 (en) | 2001-10-31 | 2003-08-21 | Gales George S. | System and method of defining the security condition of a computer system | 
| US8387111B2 (en) | 2001-11-01 | 2013-02-26 | International Business Machines Corporation | Type independent permission based access control | 
| US20030084325A1 (en) | 2001-11-01 | 2003-05-01 | International Business Machines Corporation | Method and apparatus for implementing permission based access control through permission type inheritance | 
| US7603440B1 (en)* | 2001-11-09 | 2009-10-13 | Persystent Technology Corporation | System and method for management of end user computing devices | 
| US6816985B2 (en) | 2001-11-13 | 2004-11-09 | Sun Microsystems, Inc. | Method and apparatus for detecting corrupt software code | 
| US7243230B2 (en) | 2001-11-16 | 2007-07-10 | Microsoft Corporation | Transferring application secrets in a trusted operating system environment | 
| JP2003150424A (en) | 2001-11-16 | 2003-05-23 | Fujitsu Ltd | File system, control method, and program | 
| US7840488B2 (en) | 2001-11-20 | 2010-11-23 | Contentguard Holdings, Inc. | System and method for granting access to an item or permission to use an item based on configurable conditions | 
| JP2003223363A (en) | 2001-11-21 | 2003-08-08 | Ricoh Co Ltd | Document processing device | 
| US20030101234A1 (en) | 2001-11-28 | 2003-05-29 | International Business Machines Corporation | System and method for indicating whether a document is cached | 
| US20030101381A1 (en) | 2001-11-29 | 2003-05-29 | Nikolay Mateev | System and method for virus checking software | 
| JP3914757B2 (en) | 2001-11-30 | 2007-05-16 | デュアキシズ株式会社 | Apparatus, method and system for virus inspection | 
| US7234164B2 (en) | 2001-11-30 | 2007-06-19 | Computer Associates Think, Inc. | Method and system for blocking execution of malicious code | 
| US20030105973A1 (en) | 2001-12-04 | 2003-06-05 | Trend Micro Incorporated | Virus epidemic outbreak command system and method using early warning monitors in a network environment | 
| US7062553B2 (en) | 2001-12-04 | 2006-06-13 | Trend Micro, Inc. | Virus epidemic damage control system and method for network environment | 
| US7631184B2 (en) | 2002-05-14 | 2009-12-08 | Nicholas Ryan | System and method for imposing security on copies of secured items | 
| US20030110169A1 (en) | 2001-12-12 | 2003-06-12 | Secretseal Inc. | System and method for providing manageability to security information for secured items | 
| US7783765B2 (en) | 2001-12-12 | 2010-08-24 | Hildebrand Hal S | System and method for providing distributed access control to secured documents | 
| US10033700B2 (en) | 2001-12-12 | 2018-07-24 | Intellectual Ventures I Llc | Dynamic evaluation of access rights | 
| US7260555B2 (en) | 2001-12-12 | 2007-08-21 | Guardian Data Storage, Llc | Method and architecture for providing pervasive security to digital assets | 
| US7058975B2 (en) | 2001-12-14 | 2006-06-06 | Mcafee, Inc. | Method and system for delayed write scanning for detecting computer malwares | 
| DE10162291A1 (en) | 2001-12-19 | 2003-07-03 | Philips Intellectual Property | Method for preventing unauthorized execution of a computer program, especially for preventing unauthorized execution of a ROM based self-test of a smart card, by incorporation of an internal signature within the self-test routine | 
| WO2003054724A2 (en) | 2001-12-20 | 2003-07-03 | Douglas Monahan | File identification system and method | 
| US7398389B2 (en) | 2001-12-20 | 2008-07-08 | Coretrace Corporation | Kernel-based network security infrastructure | 
| GB0130805D0 (en) | 2001-12-22 | 2002-02-06 | Koninkl Philips Electronics Nv | Dealing with a computer virus which self-propagates by e-mail | 
| US7114185B2 (en) | 2001-12-26 | 2006-09-26 | Mcafee, Inc. | Identifying malware containing computer files using embedded text | 
| US7415726B2 (en) | 2001-12-28 | 2008-08-19 | Mcafee, Inc. | Controlling access to suspicious files | 
| TWI286701B (en) | 2002-01-09 | 2007-09-11 | Via Tech Inc | Process for avoiding system infection of software viruses | 
| US7168008B2 (en) | 2002-01-18 | 2007-01-23 | Mobitv, Inc. | Method and system for isolating and protecting software components | 
| US7363506B2 (en) | 2002-01-30 | 2008-04-22 | Cybersoft, Inc. | Software virus detection methods, apparatus and articles of manufacture | 
| US7249379B2 (en) | 2002-02-01 | 2007-07-24 | Systems Advisory Group Enterprises, Inc. | Method and apparatus for implementing process-based security in a computer system | 
| US20030154394A1 (en) | 2002-02-13 | 2003-08-14 | Levin Lawrence R. | Computer virus control | 
| JP4088082B2 (en) | 2002-02-15 | 2008-05-21 | 株式会社東芝 | Apparatus and program for preventing infection by unknown computer virus | 
| US20030158872A1 (en) | 2002-02-19 | 2003-08-21 | Media Vu, Llc | Method and system for checking content before dissemination | 
| AU2003219823A1 (en) | 2002-02-20 | 2003-09-09 | Bitpipe, Inc. | Electronic document tracking | 
| US7631196B2 (en) | 2002-02-25 | 2009-12-08 | Intel Corporation | Method and apparatus for loading a trustable operating system | 
| US7096498B2 (en) | 2002-03-08 | 2006-08-22 | Cipher Trust, Inc. | Systems and methods for message threat management | 
| EP1488330B1 (en) | 2002-03-15 | 2014-05-07 | Shinkuro, Inc. | Method for forming groups | 
| JP4078454B2 (en) | 2002-03-22 | 2008-04-23 | 株式会社日立製作所 | Digital signature management method, digital signature processing apparatus, program, and recording medium | 
| US20030178381A1 (en) | 2002-03-22 | 2003-09-25 | Linda Liang | Collapsible article holder | 
| US20030182561A1 (en) | 2002-03-25 | 2003-09-25 | International Business Machines Corporation | Tamper detection mechanism for a personal computer and a method of use thereof | 
| EP1349033B1 (en) | 2002-03-26 | 2004-03-31 | Soteres GmbH | A method of protecting the integrity of a computer program | 
| US20030187848A1 (en) | 2002-04-02 | 2003-10-02 | Hovhannes Ghukasyan | Method and apparatus for restricting access to a database according to user permissions | 
| WO2003085532A1 (en) | 2002-04-02 | 2003-10-16 | Corporation For National Research Initiatives | Authenticating and using digital objects | 
| US20030192041A1 (en) | 2002-04-03 | 2003-10-09 | Mentze Duane E. | software distribution system and method | 
| AU2003227314A1 (en) | 2002-04-03 | 2003-10-13 | Invisicom, Inc. | Protection of data by hiding the data | 
| JP2004005008A (en) | 2002-04-04 | 2004-01-08 | Scinet Corp | Protection method for contents of writing in electronic publication distribution | 
| US7543333B2 (en) | 2002-04-08 | 2009-06-02 | Microsoft Corporation | Enhanced computer intrusion detection methods and systems | 
| ATE426858T1 (en) | 2002-04-13 | 2009-04-15 | Computer Ass Think Inc | SYSTEM AND METHOD FOR DETECTING MALICIOUS CODE | 
| US6782477B2 (en) | 2002-04-16 | 2004-08-24 | Song Computer Entertainment America Inc. | Method and system for using tamperproof hardware to provide copy protection and online security | 
| US6715085B2 (en) | 2002-04-18 | 2004-03-30 | International Business Machines Corporation | Initializing, maintaining, updating and recovering secure operation within an integrated system employing a data access control function | 
| DE10217862A1 (en) | 2002-04-22 | 2003-11-13 | Fraunhofer Ges Forschung | Method for labeling a virtual goods and device for providing a label for a virtual goods | 
| US6976023B2 (en) | 2002-04-23 | 2005-12-13 | International Business Machines Corporation | System and method for managing application specific privileges in a content management system | 
| US6782349B2 (en) | 2002-05-03 | 2004-08-24 | International Business Machines Corporation | Method and system for updating a root of trust measurement function in a personal computer | 
| EP2110975A1 (en) | 2002-05-06 | 2009-10-21 | Bentley Systems, Incorporated | Method and system for digital signatures | 
| US20040111632A1 (en) | 2002-05-06 | 2004-06-10 | Avner Halperin | System and method of virus containment in computer networks | 
| US8327446B2 (en) | 2002-05-06 | 2012-12-04 | Trend Micro Inc. | Antivirus stand-alone network or internet appliance and methods therefor | 
| WO2003100556A2 (en) | 2002-05-20 | 2003-12-04 | Smarte Solutions, Inc. | Cd media anti-piracy generation and management system and process | 
| US7409717B1 (en) | 2002-05-23 | 2008-08-05 | Symantec Corporation | Metamorphic computer virus detection | 
| GB0212315D0 (en) | 2002-05-28 | 2002-07-10 | Symbian Ltd | Secure mobile wireless device with protected file systems | 
| US7065759B2 (en) | 2002-06-18 | 2006-06-20 | Hewlett-Packard Development Company, L.P. | System and method for assigning basic blocks to computer control flow paths | 
| US20030236995A1 (en) | 2002-06-21 | 2003-12-25 | Fretwell Lyman Jefferson | Method and apparatus for facilitating detection of network intrusion | 
| US20060031381A1 (en) | 2002-07-24 | 2006-02-09 | Koninklijke Philips Electrices N.V. | Method and device for regulating file sharing | 
| NL1021300C2 (en) | 2002-08-19 | 2004-03-01 | Tno | Computer network security. | 
| US20040044628A1 (en) | 2002-08-27 | 2004-03-04 | Microsoft Corporation | Method and system for enforcing online identity consent polices | 
| US7748039B2 (en) | 2002-08-30 | 2010-06-29 | Symantec Corporation | Method and apparatus for detecting malicious code in an information handling system | 
| US7832011B2 (en) | 2002-08-30 | 2010-11-09 | Symantec Corporation | Method and apparatus for detecting malicious code in an information handling system | 
| US7401221B2 (en) | 2002-09-04 | 2008-07-15 | Microsoft Corporation | Advanced stream format (ASF) data stream header object protection | 
| US7225461B2 (en) | 2002-09-04 | 2007-05-29 | Hitachi, Ltd. | Method for updating security information, client, server and management computer therefor | 
| US20040054893A1 (en) | 2002-09-18 | 2004-03-18 | Anthony Ellis | Method and system for a file encryption and monitoring system | 
| US20040073607A1 (en) | 2002-09-25 | 2004-04-15 | Su Chi Chung | Multimedia messaging system and method | 
| US7334219B2 (en) | 2002-09-30 | 2008-02-19 | Ensco, Inc. | Method and system for object level software testing | 
| US7188369B2 (en) | 2002-10-03 | 2007-03-06 | Trend Micro, Inc. | System and method having an antivirus virtual scanning processor with plug-in functionalities | 
| US20040068559A1 (en) | 2002-10-04 | 2004-04-08 | Shaw Terry D. | Method for detection of unauthorized computer system usage | 
| US7337471B2 (en) | 2002-10-07 | 2008-02-26 | Symantec Corporation | Selective detection of malicious computer code | 
| US7469419B2 (en) | 2002-10-07 | 2008-12-23 | Symantec Corporation | Detection of malicious computer code | 
| US20040073789A1 (en) | 2002-10-15 | 2004-04-15 | Powers John Stephenson | Method for collaborative software licensing of electronically distributed computer programs | 
| JP4400059B2 (en) | 2002-10-17 | 2010-01-20 | 株式会社日立製作所 | Policy setting support tool | 
| US20040078580A1 (en) | 2002-10-18 | 2004-04-22 | Trend Micro Incorporated | Antivirus network system and method for handling electronic mails infected by computer viruses | 
| US20040128169A1 (en) | 2002-10-18 | 2004-07-01 | Lusen William D. | Multiple organization data access monitoring and management system | 
| US7039833B2 (en) | 2002-10-21 | 2006-05-02 | I2 Technologies Us, Inc. | Stack trace generated code compared with database to find error resolution information | 
| JP2004151195A (en) | 2002-10-29 | 2004-05-27 | Sony Corp | Device and method for communication, program, storage medium, and terminal device | 
| US7278019B2 (en) | 2002-11-04 | 2007-10-02 | Hewlett-Packard Development Company, L.P. | Method of hindering the propagation of a computer virus | 
| US7984435B2 (en) | 2002-11-13 | 2011-07-19 | Hewlett-Packard Development Company, L.P. | Update system employing reference software to reduce number of update packages | 
| WO2004044756A1 (en) | 2002-11-14 | 2004-05-27 | Mobidata Group Pty Limited | System and method relating to remotely accessible securely stored data files | 
| US7484219B2 (en) | 2002-11-21 | 2009-01-27 | Microsoft Corporation | Synchronizing centralized data store from distributed independent data stores using fixed application programming interfaces | 
| US6786076B2 (en) | 2002-11-25 | 2004-09-07 | Reliable Instruments Llc | Thin film gas sensor | 
| US7440571B2 (en) | 2002-12-03 | 2008-10-21 | Nagravision S.A. | Method for securing software updates | 
| US7020804B2 (en) | 2002-12-03 | 2006-03-28 | Lockheed Martin Corporation | Test data generation system for evaluating data cleansing applications | 
| US8024781B2 (en) | 2002-12-04 | 2011-09-20 | Microsoft Corporation | Signing-in to software applications having secured features | 
| US7428751B2 (en) | 2002-12-05 | 2008-09-23 | Microsoft Corporation | Secure recovery in a serverless distributed file system | 
| US20040111414A1 (en) | 2002-12-06 | 2004-06-10 | International Business Machines Corporation | System and method for selective execution of statements with surrogate authority | 
| US7024689B2 (en) | 2002-12-13 | 2006-04-04 | Intuit, Inc. | Granting access rights to unattended software | 
| US7120635B2 (en) | 2002-12-16 | 2006-10-10 | International Business Machines Corporation | Event-based database access execution | 
| US7373664B2 (en) | 2002-12-16 | 2008-05-13 | Symantec Corporation | Proactive protection against e-mail worms and spam | 
| US7631353B2 (en) | 2002-12-17 | 2009-12-08 | Symantec Corporation | Blocking replication of e-mail worms | 
| US7418730B2 (en) | 2002-12-17 | 2008-08-26 | International Business Machines Corporation | Automatic client responses to worm or hacker attacks | 
| US20040123117A1 (en) | 2002-12-18 | 2004-06-24 | Symantec Corporation | Validation for behavior-blocking system | 
| US7594111B2 (en) | 2002-12-19 | 2009-09-22 | Massachusetts Institute Of Technology | Secure execution of a computer program | 
| EP1573478A2 (en) | 2002-12-19 | 2005-09-14 | International Business Machines Corporation | A method for distributing software licenses using xml documents | 
| US7305564B2 (en) | 2002-12-19 | 2007-12-04 | International Business Machines Corporation | System and method to proactively detect software tampering | 
| US7013483B2 (en) | 2003-01-03 | 2006-03-14 | Aladdin Knowledge Systems Ltd. | Method for emulating an executable code in order to detect maliciousness | 
| US7533148B2 (en) | 2003-01-09 | 2009-05-12 | Microsoft Corporation | Framework to enable integration of anti-spam technologies | 
| US7200598B2 (en) | 2003-01-16 | 2007-04-03 | Hewlett-Packard Development Company, L.P. | System and method for efficiently replicating a file among a plurality of recipients having improved scalability | 
| US20040143749A1 (en) | 2003-01-16 | 2004-07-22 | Platformlogic, Inc. | Behavior-based host-based intrusion prevention system | 
| US7174334B2 (en) | 2003-01-16 | 2007-02-06 | Hewlett-Packard Development Company, L.P. | System and method for efficiently replicating a file among a plurality of recipients | 
| US20040153644A1 (en) | 2003-02-05 | 2004-08-05 | Mccorkendale Bruce | Preventing execution of potentially malicious software | 
| US7228563B2 (en) | 2003-02-06 | 2007-06-05 | Symantec Corporation | Shell code blocking system and method | 
| US7293290B2 (en) | 2003-02-06 | 2007-11-06 | Symantec Corporation | Dynamic detection of computer worms | 
| US20040158730A1 (en) | 2003-02-11 | 2004-08-12 | International Business Machines Corporation | Running anti-virus software on a network attached storage device | 
| US20040162781A1 (en) | 2003-02-14 | 2004-08-19 | Kennsco, Inc. | Monitoring and alert systems and methods | 
| WO2004072834A1 (en) | 2003-02-14 | 2004-08-26 | Whale Communications Ltd. | System and method for providing conditional access to server-based applications from remote access devices | 
| US7565551B2 (en) | 2003-02-19 | 2009-07-21 | Microsoft Corporation | Enhancing software integrity through installation and verification | 
| EP2182465B1 (en) | 2003-02-21 | 2013-05-01 | Research In Motion Limited | System and method of multiple-level control of electronic devices | 
| US20040168005A1 (en) | 2003-02-21 | 2004-08-26 | Sun Microsystems, Inc. | Methods for interrupting a program and for obtaining program execution acquisition | 
| JP2004258777A (en) | 2003-02-24 | 2004-09-16 | Fujitsu Ltd | Security management device, security management system, security management method, security management program | 
| US7478096B2 (en) | 2003-02-26 | 2009-01-13 | Burnside Acquisition, Llc | History preservation in a computer storage system | 
| JP4077336B2 (en) | 2003-02-26 | 2008-04-16 | 富士通株式会社 | Anomaly detection method, anomaly detection program, server, computer | 
| US7555749B2 (en) | 2003-03-10 | 2009-06-30 | Microsoft Corporation | Software updating system and method | 
| WO2004081758A2 (en) | 2003-03-12 | 2004-09-23 | Digex, Inc. | System and method for maintaining installed software compliance with build standards | 
| FR2852413B1 (en) | 2003-03-12 | 2005-05-20 | SECURE, INVIOLABLE AND INFALSIFIABLE DEVICE FOR THE STORAGE OF AUTHENTICATED AND DATED DATA WITH LEGAL OR LEGAL VALUE | |
| KR20040080844A (en) | 2003-03-14 | 2004-09-20 | 주식회사 안철수연구소 | Method to detect malicious scripts using static analysis | 
| KR100509650B1 (en) | 2003-03-14 | 2005-08-23 | 주식회사 안철수연구소 | Method to detect malicious scripts using code insertion technique | 
| US7185015B2 (en) | 2003-03-14 | 2007-02-27 | Websense, Inc. | System and method of monitoring and controlling application files | 
| KR100503386B1 (en) | 2003-03-14 | 2005-07-26 | 주식회사 안철수연구소 | Method to detect malicious code patterns with due regard to control and data flow | 
| US7584467B2 (en) | 2003-03-17 | 2009-09-01 | Microsoft Corporation | Software updating system and method | 
| US7546638B2 (en) | 2003-03-18 | 2009-06-09 | Symantec Corporation | Automated identification and clean-up of malicious computer code | 
| JP3835421B2 (en) | 2003-03-28 | 2006-10-18 | コニカミノルタビジネステクノロジーズ株式会社 | Control program and control device | 
| JP3945438B2 (en) | 2003-03-28 | 2007-07-18 | コニカミノルタビジネステクノロジーズ株式会社 | Control program and control device | 
| GB2403820A (en) | 2003-03-28 | 2005-01-12 | Hewlett Packard Development Co | Security policy in trusted computing systems | 
| US7353535B2 (en) | 2003-03-31 | 2008-04-01 | Microsoft Corporation | Flexible, selectable, and fine-grained network trust policies | 
| US8171551B2 (en) | 2003-04-01 | 2012-05-01 | Mcafee, Inc. | Malware detection using external call characteristics | 
| FR2853742B1 (en) | 2003-04-08 | 2005-07-08 | Regie Autonome Transports | CENTRALIZED INFORMATION BACKUP SYSTEM | 
| US20040205419A1 (en) | 2003-04-10 | 2004-10-14 | Trend Micro Incorporated | Multilevel virus outbreak alert based on collaborative behavior | 
| US7788724B2 (en) | 2003-04-10 | 2010-08-31 | Symantec Corporation | System and method for detecting malicious applications | 
| GB2400463B (en) | 2003-04-11 | 2005-05-25 | Nextenders | Data processing apparatus and method for distributing and authenticating electronic documents | 
| US7254811B2 (en) | 2003-04-17 | 2007-08-07 | Ntt Docomo, Inc. | Update system and method for updating a scanning subsystem in a mobile communication framework | 
| WO2004095176A2 (en) | 2003-04-18 | 2004-11-04 | Ounce Labs, Inc. | Detecting vulnerabilities in source code | 
| US7587422B2 (en) | 2003-04-24 | 2009-09-08 | Neopath Networks, Inc. | Transparent file replication using namespace replication | 
| US20040215656A1 (en) | 2003-04-25 | 2004-10-28 | Marcus Dill | Automated data mining runs | 
| US7139781B2 (en) | 2003-04-29 | 2006-11-21 | International Business Machines Corporation | Managing filesystem versions | 
| US7461395B2 (en) | 2003-05-06 | 2008-12-02 | Oracle International Corporation | Distributed capability-based authorization architecture using roles | 
| US7322029B2 (en) | 2003-05-08 | 2008-01-22 | American Megatrends, Inc. | Method and system for recovering program code in a computer system | 
| US20040225877A1 (en) | 2003-05-09 | 2004-11-11 | Zezhen Huang | Method and system for protecting computer system from malicious software operation | 
| EP1634136A1 (en) | 2003-05-13 | 2006-03-15 | International Business Machines Corporation | System for real-time healing of vital computer files | 
| US7386617B2 (en) | 2003-05-15 | 2008-06-10 | International Business Machines Corporation | Method, system and program product for managing multiple network application versions | 
| US7917751B2 (en) | 2003-05-22 | 2011-03-29 | International Business Machines Corporation | Distributed filesystem network security extension | 
| US20040250086A1 (en) | 2003-05-23 | 2004-12-09 | Harris Corporation | Method and system for protecting against software misuse and malicious code | 
| US7257835B2 (en) | 2003-05-28 | 2007-08-14 | Microsoft Corporation | Securely authorizing the performance of actions | 
| US7231667B2 (en) | 2003-05-29 | 2007-06-12 | Computer Associates Think, Inc. | System and method for computer virus detection utilizing heuristic analysis | 
| US7730033B2 (en) | 2003-06-13 | 2010-06-01 | Microsoft Corporation | Mechanism for exposing shadow copies in a networked environment | 
| MXPA06000102A (en) | 2003-06-23 | 2006-06-27 | Sony Pictures Entertainment | Fingerprinting of data. | 
| US20050005105A1 (en) | 2003-06-24 | 2005-01-06 | Brown Larry Cecil | Remote access control feature for limiting access to configuration file components | 
| US7567991B2 (en) | 2003-06-25 | 2009-07-28 | Emc Corporation | Replication of snapshot using a file system copy differential | 
| JP4150854B2 (en) | 2003-06-27 | 2008-09-17 | 日本電気株式会社 | Access system and client for shared disk device on storage area network | 
| US7155484B2 (en) | 2003-06-30 | 2006-12-26 | Bellsouth Intellectual Property Corporation | Filtering email messages corresponding to undesirable geographical regions | 
| US20040267837A1 (en) | 2003-06-30 | 2004-12-30 | Nokia Inc. | System and method for updating network appliances using urgent update notifications | 
| US7596807B2 (en) | 2003-07-03 | 2009-09-29 | Arbor Networks, Inc. | Method and system for reducing scope of self-propagating attack code in network | 
| US20040172551A1 (en) | 2003-12-09 | 2004-09-02 | Michael Connor | First response computer virus blocking. | 
| US7555777B2 (en) | 2004-01-13 | 2009-06-30 | International Business Machines Corporation | Preventing attacks in a data processing system | 
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| US4809160A (en)* | 1985-10-28 | 1989-02-28 | Hewlett-Packard Company | Privilege level checking instruction for implementing a secure hierarchical computer system | 
| US4908861A (en)* | 1987-08-28 | 1990-03-13 | International Business Machines Corporation | Data authentication using modification detection codes based on a public one way encryption function | 
| US5283830A (en)* | 1991-12-17 | 1994-02-01 | International Computers Limited | Security mechanism for a computer system | 
| US5502815A (en)* | 1992-03-30 | 1996-03-26 | Cozza; Paul D. | Method and apparatus for increasing the speed at which computer viruses are detected | 
| US5278901A (en)* | 1992-04-30 | 1994-01-11 | International Business Machines Corporation | Pattern-oriented intrusion-detection system and method | 
| US5495571A (en)* | 1992-09-30 | 1996-02-27 | Microsoft Corporation | Method and system for performing parametric testing of a functional programming interface | 
| US5613107A (en)* | 1992-12-22 | 1997-03-18 | Bull, S.A. | Method and apparatus for managing file versions in an information processing system based on a predetermined amount of storage media | 
| US6195587B1 (en)* | 1993-10-29 | 2001-02-27 | Sophos Plc | Validity checking | 
| US5495533A (en)* | 1994-04-29 | 1996-02-27 | International Business Machines Corporation | Personal key archive | 
| US5613002A (en)* | 1994-11-21 | 1997-03-18 | International Business Machines Corporation | Generic disinfection of programs infected with a computer virus | 
| US5485575A (en)* | 1994-11-21 | 1996-01-16 | International Business Machines Corporation | Automatic analysis of a computer virus structure and means of attachment to its hosts | 
| US5708780A (en)* | 1995-06-07 | 1998-01-13 | Open Market, Inc. | Internet server access control and monitoring systems | 
| US5859966A (en)* | 1995-10-10 | 1999-01-12 | Data General Corporation | Security system for computer systems | 
| US6029175A (en)* | 1995-10-26 | 2000-02-22 | Teknowledge Corporation | Automatic retrieval of changed files by a network software agent | 
| US5708709A (en)* | 1995-12-08 | 1998-01-13 | Sun Microsystems, Inc. | System and method for managing try-and-buy usage of application programs | 
| US6178508B1 (en)* | 1995-12-28 | 2001-01-23 | International Business Machines Corp. | System for controlling access to encrypted data files by a plurality of users | 
| US6021491A (en)* | 1996-11-27 | 2000-02-01 | Sun Microsystems, Inc. | Digital signatures for data streams and data archives | 
| US6026205A (en)* | 1997-01-21 | 2000-02-15 | Molecular Optoelectronics Corporation | Compound optical waveguide and filter applications thereof | 
| US6026502A (en)* | 1997-01-27 | 2000-02-15 | Wakayama; Hironori | Method and mechanism for preventing from invading of computer virus and/or hacker | 
| US6173284B1 (en)* | 1997-05-20 | 2001-01-09 | University Of Charlotte City Of Charlotte | Systems, methods and computer program products for automatically monitoring police records for a crime profile | 
| US6681227B1 (en)* | 1997-11-19 | 2004-01-20 | Ns Solutions Corporation | Database system and a method of data retrieval from the system | 
| US6516395B1 (en)* | 1997-11-20 | 2003-02-04 | Advanced Micro Devices, Inc. | System and method for controlling access to a privilege-partitioned address space with a fixed set of attributes | 
| US6021510A (en)* | 1997-11-24 | 2000-02-01 | Symantec Corporation | Antivirus accelerator | 
| US6018747A (en)* | 1997-11-26 | 2000-01-25 | International Business Machines Corporation | Method for generating and reconstructing in-place delta files | 
| US6023723A (en)* | 1997-12-22 | 2000-02-08 | Accepted Marketing, Inc. | Method and system for filtering unwanted junk e-mail utilizing a plurality of filtering mechanisms | 
| US6029256A (en)* | 1997-12-31 | 2000-02-22 | Network Associates, Inc. | Method and system for allowing computer programs easy access to features of a virus scanning engine | 
| US6026402A (en)* | 1998-01-07 | 2000-02-15 | Hewlett-Packard Company | Process restriction within file system hierarchies | 
| US6513111B2 (en)* | 1998-02-09 | 2003-01-28 | Reuters, Ltd | Method of controlling software applications specific to a group of users | 
| US6023586A (en)* | 1998-02-10 | 2000-02-08 | Novell, Inc. | Integrity verifying and correcting software | 
| US6684210B1 (en)* | 1998-04-06 | 2004-01-27 | Matsushita Electric Industrial Co., Ltd. | File managing system, file management apparatus, file management method, and program storage medium | 
| US20020002684A1 (en)* | 1998-05-01 | 2002-01-03 | Barbara L. Fox | Intelligent trust management method and system | 
| US6505300B2 (en)* | 1998-06-12 | 2003-01-07 | Microsoft Corporation | Method and system for secure running of untrusted content | 
| US6505237B2 (en)* | 1998-07-24 | 2003-01-07 | Siemens Information & Communication Networks, Inc. | Method and system for management of message attachments | 
| US6338149B1 (en)* | 1998-07-31 | 2002-01-08 | Westinghouse Electric Company Llc | Change monitoring system for a computer system | 
| US6338141B1 (en)* | 1998-09-30 | 2002-01-08 | Cybersoft, Inc. | Method and apparatus for computer virus detection, analysis, and removal in real time | 
| US6349311B1 (en)* | 1999-02-01 | 2002-02-19 | Symantec Corporation | Storage of reverse delta updates | 
| US6678741B1 (en)* | 1999-04-09 | 2004-01-13 | Sun Microsystems, Inc. | Method and apparatus for synchronizing firmware | 
| US20020019932A1 (en)* | 1999-06-10 | 2002-02-14 | Eng-Whatt Toh | Cryptographically secure network | 
| US6513039B1 (en)* | 1999-06-24 | 2003-01-28 | International Business Machines Corporation | Profile inferencing through automated access control list analysis heuristics | 
| US6675205B2 (en)* | 1999-10-14 | 2004-01-06 | Arcessa, Inc. | Peer-to-peer automated anonymous asynchronous file sharing | 
| US6351776B1 (en)* | 1999-11-04 | 2002-02-26 | Xdrive, Inc. | Shared internet storage resource, user interface system, and method | 
| US6681387B1 (en)* | 1999-12-01 | 2004-01-20 | Board Of Trustees Of The University Of Illinois | Method and apparatus for instruction execution hot spot detection and monitoring in a data processing unit | 
| US6697950B1 (en)* | 1999-12-22 | 2004-02-24 | Networks Associates Technology, Inc. | Method and apparatus for detecting a macro computer virus using static analysis | 
| US6694328B1 (en)* | 2000-01-13 | 2004-02-17 | International Business Machines Corporation | Method for creating queries on version objects | 
| US6694336B1 (en)* | 2000-01-25 | 2004-02-17 | Fusionone, Inc. | Data transfer and synchronization system | 
| US20020005017A1 (en)* | 2000-03-31 | 2002-01-17 | Jsr Corporation | Aqueous dispersion for chemical mechanical polishing | 
| US20020004874A1 (en)* | 2000-05-01 | 2002-01-10 | Hideyuki Agata | Apparatus and method for processing information, and program and medium used therefor | 
| US20020005105A1 (en)* | 2000-05-09 | 2002-01-17 | Mcpherson Mathew | Arrangement of a sound hole and construction of a sound board in an acoustic guitar | 
| US20040034794A1 (en)* | 2000-05-28 | 2004-02-19 | Yaron Mayer | System and method for comprehensive general generic protection for computers against malicious programs that may steal information and/or cause damages | 
| US20020004908A1 (en)* | 2000-07-05 | 2002-01-10 | Nicholas Paul Andrew Galea | Electronic mail message anti-virus system and method | 
| US20020004902A1 (en)* | 2000-07-07 | 2002-01-10 | Eng-Whatt Toh | Secure and reliable document delivery | 
| US20020026576A1 (en)* | 2000-08-18 | 2002-02-28 | Hewlett-Packard Company | Apparatus and method for establishing trust | 
| US6681344B1 (en)* | 2000-09-14 | 2004-01-20 | Microsoft Corporation | System and method for automatically diagnosing a computer problem | 
| US20040039921A1 (en)* | 2000-10-17 | 2004-02-26 | Shyne-Song Chuang | Method and system for detecting rogue software | 
| US6839721B2 (en)* | 2001-01-12 | 2005-01-04 | Hewlett-Packard Development Company, L.P. | Integration of a database into file management software for protecting, tracking, and retrieving data | 
| US6694457B2 (en)* | 2001-03-06 | 2004-02-17 | Hewlett-Packard Development Company, L.P. | System and method for monitoring execution of privileged instructions | 
| US20030018903A1 (en)* | 2001-03-19 | 2003-01-23 | Greca Damon G. Della | Method of containing spread of computer viruses | 
| US7483993B2 (en)* | 2001-04-06 | 2009-01-27 | Symantec Corporation | Temporal access control for computer virus prevention | 
| US20040039924A1 (en)* | 2001-04-09 | 2004-02-26 | Baldwin Robert W. | System and method for security of computing devices | 
| US6697810B2 (en)* | 2001-04-19 | 2004-02-24 | Vigilance, Inc. | Security system for event monitoring, detection and notification system | 
| US20050022004A1 (en)* | 2001-04-24 | 2005-01-27 | Microsoft Corporation | Robust recognizer of perceptually similar content | 
| US20030004922A1 (en)* | 2001-06-27 | 2003-01-02 | Ontrack Data International, Inc. | System and method for data management | 
| US6513122B1 (en)* | 2001-06-29 | 2003-01-28 | Networks Associates Technology, Inc. | Secure gateway for analyzing textual content to identify a harmful impact on computer systems with known vulnerabilities | 
| US20030015973A1 (en)* | 2001-07-18 | 2003-01-23 | Kevin Ovens | Solid state traffic light with predictive failure analysis | 
| US20030023867A1 (en)* | 2001-07-25 | 2003-01-30 | Thibadeau Robert H. | Methods and systems for promoting security in a computer system employing attached storage devices | 
| US20030023864A1 (en)* | 2001-07-25 | 2003-01-30 | Igor Muttik | On-access malware scanning | 
| US20030023866A1 (en)* | 2001-07-26 | 2003-01-30 | Hinchliffe Alex James | Centrally managed malware scanning | 
| US20030023857A1 (en)* | 2001-07-26 | 2003-01-30 | Hinchliffe Alexander James | Malware infection suppression | 
| US20030023560A1 (en)* | 2001-07-27 | 2003-01-30 | Fujitsu Limited | Design asset information search system | 
| US20030028785A1 (en)* | 2001-08-01 | 2003-02-06 | Pak Michael Chin-Hwan | System and method for executing computer virus definitions containing general purpose programming language extensions | 
| US20030033308A1 (en)* | 2001-08-03 | 2003-02-13 | Patel Sujal M. | System and methods for providing a distributed file system utilizing metadata to track information about data stored throughout the system | 
| US20030033303A1 (en)* | 2001-08-07 | 2003-02-13 | Brian Collins | System and method for restricting access to secured data | 
| US20050033975A1 (en)* | 2001-08-17 | 2005-02-10 | Pasi Lahti | Preventing virus infection in a computer system | 
| US20040025043A1 (en)* | 2002-05-22 | 2004-02-05 | Microsoft Corporation | System and method for identifying potential security risks in controls | 
| US20040003279A1 (en)* | 2002-06-28 | 2004-01-01 | Beilinson Craig Adam | User controls for a computer | 
| US20040003274A1 (en)* | 2002-06-28 | 2004-01-01 | Strom Clifford P. | Protecting content on medium from unfettered distribution | 
| US20040010602A1 (en)* | 2002-07-10 | 2004-01-15 | Van Vleck Paul F. | System and method for managing access to digital content via digital rights policies | 
| US20040034638A1 (en)* | 2002-07-18 | 2004-02-19 | International Business Machines Corporation | Method for analyzing and characterizing the usage pattern of a device | 
| US20040019878A1 (en)* | 2002-07-23 | 2004-01-29 | Sreekrishna Kotnur | Software tool to detect and restore damaged or lost software components | 
| US20040031028A1 (en)* | 2002-08-06 | 2004-02-12 | Aardwork Software Limited | Updating of software | 
| US20040030913A1 (en)* | 2002-08-08 | 2004-02-12 | Trend Micro Incorporated | System and method for computer protection against malicious electronic mails by analyzing, profiling and trapping the same | 
| US20040039932A1 (en)* | 2002-08-23 | 2004-02-26 | Gidon Elazar | Apparatus, system and method for securing digital documents in a digital appliance | 
| US20050022016A1 (en)* | 2002-12-12 | 2005-01-27 | Alexander Shipp | Method of and system for heuristically detecting viruses in executable code | 
| US20050010804A1 (en)* | 2002-12-19 | 2005-01-13 | Bruening Derek L. | Secure execution of a computer program using a code cache | 
| US20050004873A1 (en)* | 2003-02-03 | 2005-01-06 | Robin Pou | Distribution and rights management of digital content | 
| US20050005168A1 (en)* | 2003-03-11 | 2005-01-06 | Richard Dick | Verified personal information database | 
| US20050010806A1 (en)* | 2003-04-18 | 2005-01-13 | Ounce Labs, Inc. | Method and system for detecting privilege escalation vulnerabilities in source code | 
| US20050015591A1 (en)* | 2003-06-12 | 2005-01-20 | International Business Machines Corporation | Multi-level multi-user web services security system and method | 
| US20050022018A1 (en)* | 2003-06-30 | 2005-01-27 | Symantec Corporation | Signature extraction system and method | 
| US20050004954A1 (en)* | 2003-07-01 | 2005-01-06 | Hand Held Products, Inc. | Systems and methods for expedited data transfer in a communication system using hash segmentation | 
| US20050015675A1 (en)* | 2003-07-03 | 2005-01-20 | Kolawa Adam K. | Method and system for automatic error prevention for computer software | 
| US20050005161A1 (en)* | 2003-07-04 | 2005-01-06 | Adrian Baldwin | Services and secure processing environments | 
| US20050015592A1 (en)* | 2003-07-15 | 2005-01-20 | Jeou-Kai Lin | System and method for application and user-based class of security | 
| US20050015760A1 (en)* | 2003-07-16 | 2005-01-20 | Oleg Ivanov | Automatic detection and patching of vulnerable files | 
| US20050021994A1 (en)* | 2003-07-21 | 2005-01-27 | Barton Christopher Andrew | Pre-approval of computer files during a malware detection | 
| US20050028002A1 (en)* | 2003-07-29 | 2005-02-03 | Mihai Christodorescu | Method and apparatus to detect malicious software | 
| US20050033976A1 (en)* | 2003-08-04 | 2005-02-10 | Sbc Knowledge Ventures, L.P. | Host intrusion detection and isolation | 
| US20050033980A1 (en)* | 2003-08-07 | 2005-02-10 | Willman Bryan Mark | Projection of trustworthiness from a trusted environment to an untrusted environment | 
| US20050033978A1 (en)* | 2003-08-08 | 2005-02-10 | Hyser Chris D. | Method and system for securing a computer system | 
| Publication number | Priority date | Publication date | Assignee | Title | 
|---|---|---|---|---|
| US9059956B2 (en) | 2003-01-31 | 2015-06-16 | Good Technology Corporation | Asynchronous real-time retrieval of data | 
| US9665708B2 (en) | 2004-12-03 | 2017-05-30 | Fortinet, Inc. | Secure system for allowing the execution of authorized computer program code | 
| US9842203B2 (en) | 2004-12-03 | 2017-12-12 | Fortinet, Inc. | Secure system for allowing the execution of authorized computer program code | 
| US9305159B2 (en) | 2004-12-03 | 2016-04-05 | Fortinet, Inc. | Secure system for allowing the execution of authorized computer program code | 
| US8161548B1 (en) | 2005-08-15 | 2012-04-17 | Trend Micro, Inc. | Malware detection using pattern classification | 
| US7930289B2 (en) | 2005-11-12 | 2011-04-19 | Apple Inc. | Methods and systems for providing improved security when using a uniform resource locator (URL) or other address or identifier | 
| US20070112814A1 (en)* | 2005-11-12 | 2007-05-17 | Cheshire Stuart D | Methods and systems for providing improved security when using a uniform resource locator (URL) or other address or identifier | 
| US20070112774A1 (en)* | 2005-11-12 | 2007-05-17 | Cheshire Stuart D | Methods and systems for providing improved security when using a uniform resource locator (URL) or other address or identifier | 
| US20140040403A1 (en)* | 2006-02-09 | 2014-02-06 | John Sargent | System, method and computer program product for gathering information relating to electronic content utilizing a dns server | 
| US9246860B2 (en)* | 2006-02-09 | 2016-01-26 | Mcafee, Inc. | System, method and computer program product for gathering information relating to electronic content utilizing a DNS server | 
| US7840958B1 (en)* | 2006-02-17 | 2010-11-23 | Trend Micro, Inc. | Preventing spyware installation | 
| US7971257B2 (en)* | 2006-08-03 | 2011-06-28 | Symantec Corporation | Obtaining network origins of potential software threats | 
| US20080034434A1 (en)* | 2006-08-03 | 2008-02-07 | Rolf Repasi | Obtaining network origins of potential software threats | 
| US20080250100A1 (en)* | 2007-04-03 | 2008-10-09 | Sony Corporation | Information processing apparatus, information processing method and computer program | 
| US7991832B2 (en)* | 2007-04-03 | 2011-08-02 | Sony Corporation | Information processing apparatus, information processing method and computer program | 
| US7854002B2 (en) | 2007-04-30 | 2010-12-14 | Microsoft Corporation | Pattern matching for spyware detection | 
| US9628513B2 (en) | 2007-04-30 | 2017-04-18 | Mcafee, Inc. | Electronic message manager system, method, and computer program product for scanning an electronic message for unwanted content and associated unwanted sites | 
| US20080271147A1 (en)* | 2007-04-30 | 2008-10-30 | Microsoft Corporation | Pattern matching for spyware detection | 
| US20150180888A1 (en)* | 2007-06-05 | 2015-06-25 | Harish Balasubramanian | System, Method and Computer Program Product for Making a Scan Decision During Communication of Data Over a Network | 
| US8589181B2 (en) | 2007-07-06 | 2013-11-19 | Mckesson Financial Holdings | Systems and methods for managing medical information | 
| US20090012813A1 (en)* | 2007-07-06 | 2009-01-08 | Mckesson Financial Holdings Limited | Systems and methods for managing medical information | 
| US8670999B2 (en) | 2007-07-06 | 2014-03-11 | Mckesson Financial Holdings | Systems and methods for managing medical information | 
| US20090077218A1 (en)* | 2007-09-14 | 2009-03-19 | Softkvm Llc | Software Method And System For Controlling And Observing Computer Networking Devices | 
| US20090077428A1 (en)* | 2007-09-14 | 2009-03-19 | Softkvm Llc | Software Method And System For Controlling And Observing Computer Networking Devices | 
| US8819655B1 (en)* | 2007-09-17 | 2014-08-26 | Symantec Corporation | Systems and methods for computer program update protection | 
| US20090172768A1 (en)* | 2007-12-28 | 2009-07-02 | Huifeng Le | Methods and apparatus for operating embedded information technology applications with a service operating system | 
| CN101539772A (en)* | 2008-01-25 | 2009-09-23 | 洛克威尔自动控制技术股份有限公司 | Product lifecycle management method and apparatus | 
| CN101286986B (en)* | 2008-05-15 | 2011-09-14 | 成都市华为赛门铁克科技有限公司 | Active defense method, device and system | 
| US8706745B1 (en)* | 2008-05-30 | 2014-04-22 | Symantec Corporation | Systems and methods for determining a file set | 
| US8607347B2 (en)* | 2008-09-29 | 2013-12-10 | Sophos Limited | Network stream scanning facility | 
| US20100083380A1 (en)* | 2008-09-29 | 2010-04-01 | Harris Mark D | Network stream scanning facility | 
| US20100161608A1 (en)* | 2008-12-18 | 2010-06-24 | Sumooh Inc. | Methods and apparatus for content-aware data de-duplication | 
| US7925683B2 (en) | 2008-12-18 | 2011-04-12 | Copiun, Inc. | Methods and apparatus for content-aware data de-duplication | 
| US20100161685A1 (en)* | 2008-12-18 | 2010-06-24 | Sumooh Inc. | Methods and apparatus for content-aware data partitioning | 
| US8589455B2 (en) | 2008-12-18 | 2013-11-19 | Copiun, Inc. | Methods and apparatus for content-aware data partitioning | 
| US10693917B1 (en) | 2009-04-10 | 2020-06-23 | Open Invention Network Llc | System and method for on-line and off-line streaming application isolation | 
| US11616821B1 (en)* | 2009-04-10 | 2023-03-28 | International Business Machines Corporation | System and method for streaming application isolation | 
| US10606634B1 (en) | 2009-04-10 | 2020-03-31 | Open Invention Network Llc | System and method for application isolation | 
| US10592942B1 (en) | 2009-04-10 | 2020-03-17 | Open Invention Network Llc | System and method for usage billing of hosted applications | 
| US11314560B1 (en) | 2009-04-10 | 2022-04-26 | Open Invention Network Llc | System and method for hierarchical interception with isolated environments | 
| US10419504B1 (en)* | 2009-04-10 | 2019-09-17 | Open Invention Network Llc | System and method for streaming application isolation | 
| US11538078B1 (en) | 2009-04-10 | 2022-12-27 | International Business Machines Corporation | System and method for usage billing of hosted applications | 
| US20120198553A1 (en)* | 2009-09-14 | 2012-08-02 | Junko Suginaka | Secure auditing system and secure auditing method | 
| US9110915B2 (en) | 2009-12-18 | 2015-08-18 | Copiun, Inc. | Highly scalable and distributed data de-duplication | 
| US9135264B2 (en) | 2010-03-12 | 2015-09-15 | Copiun, Inc. | Distributed catalog, data store, and indexing | 
| US20110225141A1 (en)* | 2010-03-12 | 2011-09-15 | Copiun, Inc. | Distributed Catalog, Data Store, and Indexing | 
| US20110231374A1 (en)* | 2010-03-16 | 2011-09-22 | Copiun, Inc. | Highly Scalable and Distributed Data De-Duplication | 
| US8452739B2 (en) | 2010-03-16 | 2013-05-28 | Copiun, Inc. | Highly scalable and distributed data de-duplication | 
| US9621405B2 (en) | 2010-08-24 | 2017-04-11 | Good Technology Holdings Limited | Constant access gateway and de-duplicated data cache server | 
| US20120066762A1 (en)* | 2010-09-13 | 2012-03-15 | Rade Todorovic | System and method of whitelisting parent virtual images | 
| US8407804B2 (en)* | 2010-09-13 | 2013-03-26 | Sophos Plc | System and method of whitelisting parent virtual images | 
| US20120150897A1 (en)* | 2010-12-08 | 2012-06-14 | International Business Machines Corporation | Calculating State of Cryptographic Objects and Generating Search Filter for Querying Cryptographic Objects | 
| US8788545B2 (en)* | 2010-12-08 | 2014-07-22 | International Business Machines Corporation | Calculating state of cryptographic objects and generating search filter for querying cryptographic objects | 
| US9298767B1 (en) | 2010-12-08 | 2016-03-29 | International Business Machines Corporation | Calculating state of cryptographic objects and generating search filter for querying cryptographic objects | 
| US9043920B2 (en) | 2012-06-27 | 2015-05-26 | Tenable Network Security, Inc. | System and method for identifying exploitable weak points in a network | 
| US9860265B2 (en) | 2012-06-27 | 2018-01-02 | Tenable Network Security, Inc. | System and method for identifying exploitable weak points in a network | 
| US10171490B2 (en) | 2012-07-05 | 2019-01-01 | Tenable, Inc. | System and method for strategic anti-malware monitoring | 
| US9088606B2 (en) | 2012-07-05 | 2015-07-21 | Tenable Network Security, Inc. | System and method for strategic anti-malware monitoring | 
| US10826975B2 (en)* | 2012-09-07 | 2020-11-03 | Oracle International Corporation | System and method for providing java cloud services for use with a cloud computing environment | 
| US10225323B2 (en)* | 2012-09-07 | 2019-03-05 | Oracle International Corporation | System and method for providing java cloud services for use with a cloud computing environment | 
| US20190166189A1 (en)* | 2012-09-07 | 2019-05-30 | Oracle International Corporation | System and method for providing java cloud services for use with a cloud computing environment | 
| US9602539B1 (en)* | 2012-09-28 | 2017-03-21 | Palo Alto Networks, Inc. | Externally defined objects in security policy | 
| US10404750B2 (en)* | 2012-09-28 | 2019-09-03 | Palo Alto Networks, Inc. | Externally defined objects in security policy | 
| US20170195369A1 (en)* | 2012-09-28 | 2017-07-06 | Palo Alto Networks, Inc. | Externally defined objects in security policy | 
| US9846706B1 (en)* | 2012-12-28 | 2017-12-19 | EMC IP Holding Company LLC | Managing mounting of file systems | 
| US9467464B2 (en) | 2013-03-15 | 2016-10-11 | Tenable Network Security, Inc. | System and method for correlating log data to discover network vulnerabilities and assets | 
| US20160119375A1 (en)* | 2013-06-04 | 2016-04-28 | Beijing Qihoo Technology Company Limited | Cloud security-based file processing method and apparatus | 
| US9948670B2 (en)* | 2013-06-04 | 2018-04-17 | Beijing Qihoo Technology Company Limited | Cloud security-based file processing by generating feedback message based on signature information and file features | 
| US10496812B2 (en) | 2013-09-06 | 2019-12-03 | Michael Guidry | Systems and methods for security in computer systems | 
| US10152518B2 (en)* | 2014-10-30 | 2018-12-11 | The Johns Hopkins University | Apparatus and method for efficient identification of code similarity | 
| US9680848B2 (en)* | 2014-12-03 | 2017-06-13 | Korea Internet & Security Agency | Apparatus, system and method for detecting and preventing malicious scripts using code pattern-based static analysis and API flow-based dynamic analysis | 
| US9544321B2 (en)* | 2015-01-30 | 2017-01-10 | Securonix, Inc. | Anomaly detection using adaptive behavioral profiles | 
| TWI595375B (en)* | 2015-01-30 | 2017-08-11 | 瑟古爾歐尼克斯股份有限公司 | Anomaly detection using adaptive behavioral profiles | 
| US20160226901A1 (en)* | 2015-01-30 | 2016-08-04 | Securonix, Inc. | Anomaly Detection Using Adaptive Behavioral Profiles | 
| CN108804925A (en)* | 2015-05-27 | 2018-11-13 | 安恒通(北京)科技有限公司 | method and system for detecting malicious code | 
| CN106096397A (en)* | 2016-05-26 | 2016-11-09 | 倪茂志 | A kind of prevention method extorting software and system | 
| US20170351870A1 (en)* | 2016-06-03 | 2017-12-07 | Honeywell International Inc. | Apparatus and method for device whitelisting and blacklisting to override protections for allowed media at nodes of a protected system | 
| US10402577B2 (en)* | 2016-06-03 | 2019-09-03 | Honeywell International Inc. | Apparatus and method for device whitelisting and blacklisting to override protections for allowed media at nodes of a protected system | 
| CN107948123A (en)* | 2016-10-12 | 2018-04-20 | 阿里巴巴集团控股有限公司 | Document transmission method and device | 
| US11375001B2 (en) | 2016-10-12 | 2022-06-28 | Alibaba Group Holding Limited | File transmission method and apparatus | 
| US20190121959A1 (en)* | 2017-08-01 | 2019-04-25 | PC Pitstop, Inc | System, Method, and Apparatus for Computer Security | 
| US20210026951A1 (en)* | 2017-08-01 | 2021-01-28 | PC Matic, Inc | System, Method, and Apparatus for Computer Security | 
| US11487868B2 (en)* | 2017-08-01 | 2022-11-01 | Pc Matic, Inc. | System, method, and apparatus for computer security | 
| US10873588B2 (en) | 2017-08-01 | 2020-12-22 | Pc Matic, Inc. | System, method, and apparatus for computer security | 
| US10783239B2 (en)* | 2017-08-01 | 2020-09-22 | Pc Matic, Inc. | System, method, and apparatus for computer security | 
| US11425170B2 (en) | 2018-10-11 | 2022-08-23 | Honeywell International Inc. | System and method for deploying and configuring cyber-security protection solution using portable storage device | 
| US10476936B1 (en) | 2018-12-13 | 2019-11-12 | Software Ag | Plugin-based file transfer systems and/or methods | 
| US12061709B2 (en)* | 2019-08-01 | 2024-08-13 | Palantir Technologies Inc. | Systems and methods for conducting data extraction using dedicated data extraction devices | 
| US20210034767A1 (en)* | 2019-08-01 | 2021-02-04 | Palantir Technologies Inc. | Systems and methods for conducting data extraction using dedicated data extraction devices | 
| US11323482B2 (en)* | 2019-12-31 | 2022-05-03 | Mcafee, Llc | Methods, systems, and media for protecting computer systems from user-created objects | 
| US11237802B1 (en) | 2020-07-20 | 2022-02-01 | Bank Of America Corporation | Architecture diagram analysis tool for software development | 
| CN114679410A (en)* | 2020-12-24 | 2022-06-28 | 网神信息技术(北京)股份有限公司 | Method, device, electronic device and storage medium for reducing external network resource occupation | 
| US20220382892A1 (en)* | 2021-05-27 | 2022-12-01 | Microsoft Technology Licensing, Llc | Centralized access control for cloud relational database management system resources | 
| US11934548B2 (en)* | 2021-05-27 | 2024-03-19 | Microsoft Technology Licensing, Llc | Centralized access control for cloud relational database management system resources | 
| US20240241980A1 (en)* | 2021-05-27 | 2024-07-18 | Microsoft Technology Licensing, Llc | Centralized access control for cloud relational database management system resources | 
| US12259992B2 (en)* | 2021-05-27 | 2025-03-25 | Microsoft Technology Licensing, Llc | Centralized access control for cloud relational database management system resources | 
| US12216785B2 (en)* | 2022-09-21 | 2025-02-04 | Acronis International Gmbh | Systems and methods for generating file systems of data sources incompatible with anti-virus scanners | 
| CN117707608A (en)* | 2024-02-04 | 2024-03-15 | 深圳市分秒网络科技有限公司 | Methods and systems for automating configuration file parameters | 
| US12229261B1 (en)* | 2024-05-03 | 2025-02-18 | Halcyon Tech, Inc. | Antiransomware file analysis and scoring | 
| Publication number | Publication date | 
|---|---|
| US8984636B2 (en) | 2015-03-17 | 
| Publication | Publication Date | Title | 
|---|---|---|
| US8984636B2 (en) | Content extractor and analysis system | |
| US8782800B2 (en) | Parametric content control in a network security system | |
| US7895651B2 (en) | Content tracking in a network security system | |
| US8272058B2 (en) | Centralized timed analysis in a network security system | |
| CA2617204C (en) | Network security systems and methods | |
| US20070028302A1 (en) | Distributed meta-information query in a network | |
| US12314396B2 (en) | Systems and methods for providing security services during power management mode | |
| US12294595B2 (en) | Computer investigation method and system | |
| US20090271863A1 (en) | Identifying unauthorized privilege escalations | |
| US20140165130A1 (en) | Application-specific re-adjustment of computer security settings | |
| US20110087899A1 (en) | Firewall plus storage apparatus, method and system | |
| US12292966B2 (en) | Systems and methods for folder and file sequestration | |
| US20240086538A1 (en) | Computer investigation method and system for investigating authentication in remote host computers | 
| Date | Code | Title | Description | 
|---|---|---|---|
| AS | Assignment | Owner name:BIT 9, INC., MASSACHUSETTS Free format text:ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:BRENNAN, TODD F.;REEL/FRAME:017004/0061 Effective date:20051012 | |
| STCF | Information on status: patent grant | Free format text:PATENTED CASE | |
| MAFP | Maintenance fee payment | Free format text:PAYMENT OF MAINTENANCE FEE, 4TH YR, SMALL ENTITY (ORIGINAL EVENT CODE: M2551); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY Year of fee payment:4 | |
| AS | Assignment | Owner name:CARBON BLACK, INC., MASSACHUSETTS Free format text:CHANGE OF NAME;ASSIGNOR:BIT9, INC.;REEL/FRAME:050123/0127 Effective date:20160127 Owner name:BIT9, INC., MASSACHUSETTS Free format text:CHANGE OF NAME;ASSIGNOR:BIT 9, INC.;REEL/FRAME:050123/0109 Effective date:20050425 | |
| FEPP | Fee payment procedure | Free format text:ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY | |
| MAFP | Maintenance fee payment | Free format text:PAYMENT OF MAINTENANCE FEE, 8TH YEAR, LARGE ENTITY (ORIGINAL EVENT CODE: M1552); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY Year of fee payment:8 | |
| AS | Assignment | Owner name:VMWARE LLC, CALIFORNIA Free format text:MERGER;ASSIGNOR:CARBON BLACK, LLC;REEL/FRAME:070019/0171 Effective date:20240820 Owner name:CARBON BLACK, LLC, CALIFORNIA Free format text:CHANGE OF NAME;ASSIGNOR:CARBON BLACK, INC.;REEL/FRAME:070023/0225 Effective date:20200122 |